iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1016/J.CSI.2020.103499
{"id":"https://openalex.org/W3108731822","doi":"https://doi.org/10.1016/j.csi.2020.103499","title":"Attribute-based proxy re-signature from standard lattices and its applications","display_name":"Attribute-based proxy re-signature from standard lattices and its applications","publication_year":2020,"publication_date":"2020-12-02","ids":{"openalex":"https://openalex.org/W3108731822","doi":"https://doi.org/10.1016/j.csi.2020.103499","mag":"3108731822"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.csi.2020.103499","pdf_url":null,"source":{"id":"https://openalex.org/S119630662","display_name":"Computer Standards & Interfaces","issn_l":"0920-5489","issn":["0920-5489","1872-7018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.csi.2020.103499","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University, Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002005849","display_name":"Saif Al\u2010Kuwari","orcid":"https://orcid.org/0000-0002-4402-7710"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]},{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Saif Al-Kuwari","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University, Qatar","Kindi Computing Research Center, Qatar University, Qatar"],"affiliations":[{"raw_affiliation_string":"Kindi Computing Research Center, Qatar University, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077617378","display_name":"Dung Hoang Duong","orcid":"https://orcid.org/0000-0001-8057-4060"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dung Hoang Duong","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000037502"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":{"value":3000,"currency":"USD","value_usd":3000,"provenance":"doaj"},"apc_paid":{"value":1949,"currency":"EUR","value_usd":2101,"provenance":"openapc"},"fwci":1.468,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":16,"citation_normalized_percentile":{"value":0.854537,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"75","issue":null,"first_page":"103499","last_page":"103499"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9791,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Combinatorial Optimization and Complexity Theory","score":0.9781,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.652236},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.60461},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.567325},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based Cryptography","score":0.530818},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.512089}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138206},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.652236},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.60461},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5597331},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.5103194},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45684564},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.44265816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37306666},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35532913},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33796233},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15498579},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.103566915},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07081607},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.csi.2020.103499","pdf_url":null,"source":{"id":"https://openalex.org/S119630662","display_name":"Computer Standards & Interfaces","issn_l":"0920-5489","issn":["0920-5489","1872-7018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Attribute-based_proxy_re-signature_from_standard_lattices_and_its_applications/24087618","pdf_url":"https://figshare.com/articles/journal_contribution/Attribute-based_proxy_re-signature_from_standard_lattices_and_its_applications/24087618/1/files/42403239.pdf","source":{"id":"https://openalex.org/S4306400572","display_name":"OPAL (Open@LaTrobe) (La Trobe University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I196829312","host_organization_name":"La Trobe University","host_organization_lineage":["https://openalex.org/I196829312"],"host_organization_lineage_names":["La Trobe University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.csi.2020.103499","pdf_url":null,"source":{"id":"https://openalex.org/S119630662","display_name":"Computer Standards & Interfaces","issn_l":"0920-5489","issn":["0920-5489","1872-7018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.69}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W113457696","https://openalex.org/W1517505812","https://openalex.org/W1590823599","https://openalex.org/W1990557721","https://openalex.org/W2038761522","https://openalex.org/W2071676384","https://openalex.org/W2109693837","https://openalex.org/W2113717903","https://openalex.org/W2114664664","https://openalex.org/W2122973102","https://openalex.org/W2159845428","https://openalex.org/W2167179301","https://openalex.org/W22455336","https://openalex.org/W2295419262","https://openalex.org/W2586906012","https://openalex.org/W2726147677","https://openalex.org/W2751076246","https://openalex.org/W2911424200","https://openalex.org/W2929538807","https://openalex.org/W2952119761","https://openalex.org/W56544557","https://openalex.org/W617730616","https://openalex.org/W649652148","https://openalex.org/W74973629"],"related_works":["https://openalex.org/W2390942931","https://openalex.org/W2386066260","https://openalex.org/W2369244966","https://openalex.org/W2367769256","https://openalex.org/W2149234266","https://openalex.org/W2125461068","https://openalex.org/W2075768550","https://openalex.org/W2033963098","https://openalex.org/W1981680180","https://openalex.org/W1932157736"],"abstract_inverted_index":{"We":[0,66,87],"introduce":[1],"Attribute-based":[2,47],"Proxy":[3,9],"Re-Signatures":[4,10],"(ABPRS),":[5],"an":[6],"extension":[7],"of":[8,21,27,44,76,121,148],"(PRS),":[11],"which":[12,50],"allows":[13],"a":[14,19,25,68,137,144,153],"semi-trusted":[15],"proxy":[16],"to":[17,59,62,135],"transform":[18],"signature":[20,26],"one":[22],"entity":[23],"into":[24],"another,":[28],"without":[29],"revealing":[30],"any":[31,106],"signing":[32],"key":[33],"and":[34,46,124],"information":[35],"about":[36],"the":[37,74,77,90,98,112,118,128],"signer.":[38],"The":[39],"proposed":[40,91,113],"primitive":[41],"combines":[42],"features":[43],"PRS":[45],"Signatures":[48],"(ABS),":[49],"is":[51,95],"useful":[52],"for":[53],"many":[54],"applications":[55],"(we":[56],"show":[57,88,133],"how":[58,134],"apply":[60],"ABPRS":[61,70,93,115,140],"three":[63],"such":[64],"applications).":[65],"propose":[67],"unidirectional":[69,92,114,139],"construction":[71,94,116],"based":[72],"on":[73,105],"hardness":[75],"Inhomogeneous":[78],"Small":[79],"Integer":[80],"Solution":[81],"(ISIS)":[82],"problem":[83],"in":[84],"standard":[85],"lattices.":[86],"that":[89,111,142],"multi-hop,":[96],"where":[97],"transformation":[99,155],"can":[100],"be":[101],"performed":[102],"multiple":[103],"times":[104],"signature.":[107],"Furthermore,":[108],"we":[109,132],"prove":[110],"satisfies":[117,143],"security":[119,146],"notion":[120,147],"no-signature-query":[122],"unforgeability":[123,150],"(perfect)":[125],"privacy,":[126],"under":[127],"ISIS":[129],"assumption.":[130],"Finally,":[131],"obtain":[136],"multi-hop":[138],"scheme":[141],"stronger":[145],"co-selective":[149],"by":[151],"using":[152],"generic":[154],"technique.":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3108731822","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3}],"updated_date":"2024-11-28T01:40:19.183642","created_date":"2020-12-07"}