{"id":"https://openalex.org/W1521895017","doi":"https://doi.org/10.1007/978-3-642-18178-8_26","title":"Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption","display_name":"Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1521895017","doi":"https://doi.org/10.1007/978-3-642-18178-8_26","mag":"1521895017"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-18178-8_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014759332","display_name":"Mayana Pereira","orcid":"https://orcid.org/0000-0001-8636-8882"},"institutions":[{"id":"https://openalex.org/I150729083","display_name":"Universidade de Bras\u00edlia","ror":"https://ror.org/02xfp8v59","country_code":"BR","type":"education","lineage":["https://openalex.org/I150729083"]},{"id":"https://openalex.org/I4210148296","display_name":"Engene (Brazil)","ror":"https://ror.org/04j9me356","country_code":"BR","type":"company","lineage":["https://openalex.org/I4210148296"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Mayana Pereira","raw_affiliation_strings":["Department of Electrical Engeneering, University of Bras\u00edlia, Campus Darcy Ribeiro, 70910-900, Bras\u00edlia, DF, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engeneering, University of Bras\u00edlia, Campus Darcy Ribeiro, 70910-900, Bras\u00edlia, DF, Brazil","institution_ids":["https://openalex.org/I150729083","https://openalex.org/I4210148296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014034048","display_name":"Rafael Dowsley","orcid":"https://orcid.org/0000-0002-7588-2410"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Rafael Dowsley","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST), 1-18-13, Sotokanda, Chyioda-ku, 101-0021, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST), 1-18-13, Sotokanda, Chyioda-ku, 101-0021, Tokyo, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047836988","display_name":"Goichiro Hanaoka","orcid":"https://orcid.org/0000-0001-6617-2962"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Goichiro Hanaoka","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST), 1-18-13, Sotokanda, Chyioda-ku, 101-0021, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST), 1-18-13, Sotokanda, Chyioda-ku, 101-0021, Tokyo, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070505291","display_name":"Anderson C. A. Nascimento","orcid":"https://orcid.org/0000-0002-8298-6250"},"institutions":[{"id":"https://openalex.org/I150729083","display_name":"Universidade de Bras\u00edlia","ror":"https://ror.org/02xfp8v59","country_code":"BR","type":"education","lineage":["https://openalex.org/I150729083"]},{"id":"https://openalex.org/I4210148296","display_name":"Engene (Brazil)","ror":"https://ror.org/04j9me356","country_code":"BR","type":"company","lineage":["https://openalex.org/I4210148296"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Anderson C. A. Nascimento","raw_affiliation_strings":["Department of Electrical Engeneering, University of Bras\u00edlia, Campus Darcy Ribeiro, 70910-900, Bras\u00edlia, DF, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engeneering, University of Bras\u00edlia, Campus Darcy Ribeiro, 70910-900, Bras\u00edlia, DF, Brazil","institution_ids":["https://openalex.org/I150729083","https://openalex.org/I4210148296"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392,"provenance":"doaj"},"apc_paid":null,"fwci":0.841,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.798631,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"299","last_page":"306"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.580179},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.572738},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.56949145},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.562817},{"id":"https://openalex.org/keywords/lightweight-ciphers","display_name":"Lightweight Ciphers","score":0.554136},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.545694},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.47609985}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7233801},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.71007985},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6715724},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6533358},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5961278},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.56949145},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.54998994},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5210654},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49563444},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47779924},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.47609985},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.45492616},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.42825863},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34391648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28758842},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21332437},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-18178-8_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.81}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1542889080","https://openalex.org/W1549397354","https://openalex.org/W1585474545","https://openalex.org/W1589176872","https://openalex.org/W2027528470","https://openalex.org/W2067318305","https://openalex.org/W2073210531","https://openalex.org/W2090903439","https://openalex.org/W2101803085","https://openalex.org/W2102697875","https://openalex.org/W2146907493","https://openalex.org/W2157679418","https://openalex.org/W2475786860","https://openalex.org/W2475855573","https://openalex.org/W2477242951","https://openalex.org/W2495595500","https://openalex.org/W3097986274"],"related_works":["https://openalex.org/W642810354","https://openalex.org/W4294892315","https://openalex.org/W4245054042","https://openalex.org/W3030536984","https://openalex.org/W2584840935","https://openalex.org/W2368943972","https://openalex.org/W2320044277","https://openalex.org/W2146985619","https://openalex.org/W1601043884","https://openalex.org/W1558439324"],"abstract_inverted_index":{"In":[0,24],"[2]":[1],"a":[2,12],"public":[3],"key":[4],"encryption":[5],"scheme":[6],"was":[7],"proposed":[8],"against":[9],"adversaries":[10],"with":[11],"bounded":[13],"number":[14],"of":[15],"decryption":[16],"queries":[17],"based":[18,37],"on":[19,38],"the":[20,30,43],"decisional":[21],"Diffie-Helman":[22,45],"Problems.":[23],"this":[25],"paper,":[26],"we":[27],"show":[28],"that":[29],"same":[31],"result":[32],"can":[33],"be":[34],"easily":[35],"obtained":[36],"weaker":[39],"computational":[40,44],"assumption,":[41],"namely:":[42],"assumption.":[46]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1521895017","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2024-09-26T17:15:21.457608","created_date":"2016-06-24"}