{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:38:52Z","timestamp":1758271132709},"reference-count":25,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,6]]},"abstract":"<jats:p> We present an access control encryption (ACE) scheme which enjoys advantages over previous works in several aspects. Our scheme ensures not only compact ciphertext size but also small size of keys installed in each user in the ACE system. Besides, to the best of our knowledge, our scheme is the first implementation of ACE with decentralized sanitizers. Comparing to ACE constructions with only one sanitizer, our scheme is more secure and reliable since it does not suffer from the single point failure. Considering the security of our scheme, we present two models catering to the no-read rule and no-write rule security requirements respectively. Additionally, our extended no-write rule model allows the corruption of some sanitizers in the ACE system and thus is stronger than the one for schemes with only one sanitizer. We prove the security of our scheme under the two models. <\/jats:p>","DOI":"10.1142\/s0129054119400112","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:51:21Z","timestamp":1562115081000},"page":"531-549","source":"Crossref","is-referenced-by-count":5,"title":["ACE with Compact Ciphertext Size and Decentralized Sanitizers"],"prefix":"10.1142","volume":"30","author":[{"given":"Zhongyuan","family":"Yao","sequence":"first","affiliation":[{"name":"School of Computing and Information Technology, University of Wollongong, Northfields Ave, Wollongong, New South Walse 2522, Australia"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, University of Wollongong, Northfields Ave, Wollongong, New South Walse 2522, Australia"}]}],"member":"219","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"issue":"2","key":"S0129054119400112BIB001","first-page":"229","volume":"4","author":"Bell D. E.","year":"1996","journal-title":"J. Comput. Sec."},{"key":"S0129054119400112BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_33"},{"key":"S0129054119400112BIB003","first-page":"27","volume-title":"CRYPTO\u201988","author":"Benaloh J. C.","year":"1988"},{"key":"S0129054119400112BIB004","first-page":"67","volume-title":"AUSCRYPT\u201992","author":"Bertilsson M.","year":"1992"},{"key":"S0129054119400112BIB005","first-page":"258","volume-title":"Advances in Cryptology \u2014 CRYPTO 2005: Proceedings of 25th Annual International Cryptology Conference","author":"Boneh D."},{"key":"S0129054119400112BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"S0129054119400112BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"S0129054119400112BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_21"},{"key":"S0129054119400112BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"S0129054119400112BIB010","first-page":"39","volume-title":"Proceedings of the First International Conference, Pairing-Based Cryptography \u2014 Pairing 2007","author":"Delerabl\u00e9e C."},{"key":"S0129054119400112BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_14"},{"key":"S0129054119400112BIB012","first-page":"480","volume-title":"CRYPTO\u201993","author":"Fiat A.","year":"1993"},{"key":"S0129054119400112BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54388-7_4"},{"key":"S0129054119400112BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2388156"},{"key":"S0129054119400112BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1045-x"},{"key":"S0129054119400112BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"S0129054119400112BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"S0129054119400112BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_13"},{"key":"S0129054119400112BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0190-0"},{"key":"S0129054119400112BIB020","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897848"},{"key":"S0129054119400112BIB021","doi-asserted-by":"publisher","DOI":"10.1145\/3055504.3055509"},{"key":"S0129054119400112BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9378-8"},{"key":"S0129054119400112BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"S0129054119400112BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"S0129054119400112BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03584-0_19"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119400112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:26:00Z","timestamp":1565119560000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119400112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":25,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,7,2]]},"published-print":{"date-parts":[[2019,6]]}},"alternative-id":["10.1142\/S0129054119400112"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119400112","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}