{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:09:30Z","timestamp":1772500170274,"version":"3.50.1"},"reference-count":46,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,6]]},"abstract":"<jats:p> As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse users\u2019 privacy in practice. In this paper, we propose an anonymous unbounded hierarchical identity-based encryption scheme, which achieves bounded leakage resilience and the hierarchy depth is not limited. Our security proofs based on the dual system encryption technique show that the proposed scheme is capable of resisting key leakage and it realizes recipient anonymity in the standard model. In addition, leakage resilience analysis indicates that our scheme allows the leakage rate of approximate 1\/3 no matter the hierarchy depth of identities. Finally, performance comparisons show the practicability of our scheme. In particular, the secret key of our construction is of a fixed-length. <\/jats:p>","DOI":"10.1142\/s0129054119400197","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:51:21Z","timestamp":1562115081000},"page":"665-681","source":"Crossref","is-referenced-by-count":6,"title":["Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity"],"prefix":"10.1142","volume":"30","author":[{"given":"Yinghui","family":"Zhang","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, P. R. China"}]},{"given":"Menglei","family":"Yang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, P. R. China"}]},{"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, P. R. China"}]},{"given":"Tiantian","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"}]},{"given":"Rui","family":"Guo","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"}]},{"given":"Fang","family":"Ren","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts &amp; Telecommunications, Xi\u2019an 710121, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"S0129054119400197BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_28"},{"key":"S0129054119400197BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"S0129054119400197BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"S0129054119400197BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.55"},{"key":"S0129054119400197BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_22"},{"key":"S0129054119400197BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33272-2_10"},{"key":"S0129054119400197BIB007","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866325"},{"key":"S0129054119400197BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49387-8_5"},{"key":"S0129054119400197BIB009","first-page":"511","author":"Dodis Y.","year":"2010","journal-title":"Foundations of Computer Science"},{"key":"S0129054119400197BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_2"},{"issue":"4","key":"S0129054119400197BIB011","volume":"15","author":"Du X.","year":"2008","journal-title":"IEEE Wireless Commun."},{"key":"S0129054119400197BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"S0129054119400197BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"S0129054119400197BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.56"},{"key":"S0129054119400197BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_32"},{"key":"S0129054119400197BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_21"},{"key":"S0129054119400197BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_36"},{"key":"S0129054119400197BIB018","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2017.084251"},{"key":"S0129054119400197BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_41"},{"key":"S0129054119400197BIB020","first-page":"1","author":"Kurosawa K.","year":"2016","journal-title":"Designs Codes & Cryptography"},{"key":"S0129054119400197BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-013-9868-6"},{"key":"S0129054119400197BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_6"},{"key":"S0129054119400197BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"S0129054119400197BIB024","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv128"},{"key":"S0129054119400197BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"S0129054119400197BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"S0129054119400197BIB027","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.056"},{"key":"S0129054119400197BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"S0129054119400197BIB029","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.27"},{"key":"S0129054119400197BIB030","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"S0129054119400197BIB031","first-page":"xii","volume":"7785","author":"Reingold O.","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"S0129054119400197BIB032","volume-title":"Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation","author":"Ryu G.","year":"2015"},{"key":"S0129054119400197BIB033","first-page":"73","author":"Simmons P.","year":"2011","journal-title":"Comput. Sci."},{"key":"S0129054119400197BIB034","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"S0129054119400197BIB035","first-page":"1","volume":"7","author":"Xiong J.","year":"2017","journal-title":"Mobile Networks Applications"},{"key":"S0129054119400197BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"S0129054119400197BIB037","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"S0129054119400197BIB038","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"S0129054119400197BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480004"},{"key":"S0129054119400197BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"S0129054119400197BIB041","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1509"},{"key":"S0129054119400197BIB042","first-page":"1","author":"Zhang Y.","year":"2017","journal-title":"J. Ambient Intelligence and Humanized Computing"},{"key":"S0129054119400197BIB043","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.009"},{"key":"S0129054119400197BIB044","author":"Zhang Y.","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"S0129054119400197BIB045","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1574"},{"key":"S0129054119400197BIB046","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw110"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119400197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:26:15Z","timestamp":1565119575000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119400197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":46,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,7,2]]},"published-print":{"date-parts":[[2019,6]]}},"alternative-id":["10.1142\/S0129054119400197"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119400197","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}