{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:JVW2Z3Y7AR3ERNWJF57WAF6DBP","short_pith_number":"pith:JVW2Z3Y7","schema_version":"1.0","canonical_sha256":"4d6dacef1f047648b6c92f7f6017c30bd28966bd8bd8f100ff66056fa6daed13","source":{"kind":"arxiv","id":"1810.10750","version":1},"attestation_state":"computed","paper":{"title":"An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jing Li, Jun Wu, Xiaojiang Du, Zhitao Guan, Zijian Zhang","submitted_at":"2018-10-25T07:46:27Z","abstract_excerpt":"With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access control on encrypted data stored in MCC. However, the computational overhead of encryption and decryption grow with the complexity of the access policy. Thus, maintaining data security as well as"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1810.10750","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-10-25T07:46:27Z","cross_cats_sorted":[],"title_canon_sha256":"3705d2295fc3a69b8173fd298e1cd37b2de3f5b7c285747765d5cd6b5e3bfc58","abstract_canon_sha256":"ac896eb5766d6d5418a75d34f68b94d994939bd9c88dbd922b51888efa7464f8"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:02:19.753502Z","signature_b64":"SzpGXCg1SBunVQWhetghioiZPuMubyrQOR6N/kEqw9JpGJ1kPHZ3BTCOBwPQPMAKrbguSy2HfHoGsJwIMv85CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"4d6dacef1f047648b6c92f7f6017c30bd28966bd8bd8f100ff66056fa6daed13","last_reissued_at":"2026-05-18T00:02:19.753109Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:02:19.753109Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jing Li, Jun Wu, Xiaojiang Du, Zhitao Guan, Zijian Zhang","submitted_at":"2018-10-25T07:46:27Z","abstract_excerpt":"With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access control on encrypted data stored in MCC. However, the computational overhead of encryption and decryption grow with the complexity of the access policy. Thus, maintaining data security as well as"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.10750","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1810.10750","created_at":"2026-05-18T00:02:19.753165+00:00"},{"alias_kind":"arxiv_version","alias_value":"1810.10750v1","created_at":"2026-05-18T00:02:19.753165+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.10750","created_at":"2026-05-18T00:02:19.753165+00:00"},{"alias_kind":"pith_short_12","alias_value":"JVW2Z3Y7AR3E","created_at":"2026-05-18T12:32:33.847187+00:00"},{"alias_kind":"pith_short_16","alias_value":"JVW2Z3Y7AR3ERNWJ","created_at":"2026-05-18T12:32:33.847187+00:00"},{"alias_kind":"pith_short_8","alias_value":"JVW2Z3Y7","created_at":"2026-05-18T12:32:33.847187+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP","json":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP.json","graph_json":"https://pith.science/api/pith-number/JVW2Z3Y7AR3ERNWJF57WAF6DBP/graph.json","events_json":"https://pith.science/api/pith-number/JVW2Z3Y7AR3ERNWJF57WAF6DBP/events.json","paper":"https://pith.science/paper/JVW2Z3Y7"},"agent_actions":{"view_html":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP","download_json":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP.json","view_paper":"https://pith.science/paper/JVW2Z3Y7","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1810.10750&json=true","fetch_graph":"https://pith.science/api/pith-number/JVW2Z3Y7AR3ERNWJF57WAF6DBP/graph.json","fetch_events":"https://pith.science/api/pith-number/JVW2Z3Y7AR3ERNWJF57WAF6DBP/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP/action/timestamp_anchor","attest_storage":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP/action/storage_attestation","attest_author":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP/action/author_attestation","sign_citation":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP/action/citation_signature","submit_replication":"https://pith.science/pith/JVW2Z3Y7AR3ERNWJF57WAF6DBP/action/replication_record"}},"created_at":"2026-05-18T00:02:19.753165+00:00","updated_at":"2026-05-18T00:02:19.753165+00:00"}