{"id":"https://openalex.org/W1927804796","doi":"https://doi.org/10.1002/sec.1256","title":"Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm","display_name":"Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm","publication_year":2015,"publication_date":"2015-04-30","ids":{"openalex":"https://openalex.org/W1927804796","doi":"https://doi.org/10.1002/sec.1256","mag":"1927804796"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1256","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101910792","display_name":"Yuan Chen","orcid":"https://orcid.org/0000-0003-3004-1455"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xi'an 710071 China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xi'an 710071 China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109147094","display_name":"Qingkuan Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingkuan Dong","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xi'an 710071 China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xi'an 710071 China","institution_ids":["https://openalex.org/I149594827"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":"8","issue":"18","first_page":"3323","last_page":"3334"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.52704674}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77098453},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.70944744},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6749682},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.52704674},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4623154},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45025364},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39833242},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3306107},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.32919183},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32845896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26912862},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.17723832},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08413279},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1256","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.41,"id":"https://metadata.un.org/sdg/9"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61402353, 61373172"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"K5051301030"}],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1516512945","https://openalex.org/W1541959781","https://openalex.org/W1562872124","https://openalex.org/W1571476681","https://openalex.org/W1585474545","https://openalex.org/W1595386590","https://openalex.org/W2059265716","https://openalex.org/W2073210531","https://openalex.org/W2096211577","https://openalex.org/W2129359810","https://openalex.org/W2129956927","https://openalex.org/W2154078507","https://openalex.org/W2156439207","https://openalex.org/W2157679418","https://openalex.org/W2157980705","https://openalex.org/W2169290761","https://openalex.org/W2501607630","https://openalex.org/W31313801","https://openalex.org/W36535589","https://openalex.org/W4285719527","https://openalex.org/W53955248","https://openalex.org/W92989823"],"related_works":["https://openalex.org/W4239631261","https://openalex.org/W4224885312","https://openalex.org/W4224285941","https://openalex.org/W3216458761","https://openalex.org/W3009555975","https://openalex.org/W2888796166","https://openalex.org/W2387858755","https://openalex.org/W2367716200","https://openalex.org/W2321203572","https://openalex.org/W2183368723"],"abstract_inverted_index":{"Abstract":[0],"Detectable":[1],"Chosen":[2],"Ciphertext":[3],"(DCCA)":[4],"security":[5,13,174],"is":[6],"a":[7,23,27,46,101,137,158,165],"useful":[8],"notion":[9],"to":[10,59,132,171],"achieve":[11,172],"CCA":[12,173],"for":[14],"public\u2010key":[15],"encryptions":[16],"(PKE).":[17],"An":[18],"\u201cinner\u2010outer\u201d":[19,188],"structure":[20,79,98],"can":[21,80,93,146],"transform":[22],"DCCA\u2010secure":[24,159],"PKE":[25],"into":[26],"CCA\u2010secure":[28,102],"one.":[29],"In":[30],"the":[31,33,38,41,64,70,78,85,90,97,106,109,118,126,142,162,178,185],"structure,":[32],"\u201cinner\u201d":[34,66,110],"layer":[35,120],"encrypts":[36],"both":[37],"message":[39],"and":[40,88,121,150],"two":[42],"embedded":[43,91],"randomness,":[44],"so":[45],"key":[47],"encapsulated":[48],"mechanism":[49,54],"(KEM)":[50],"+":[51],"data":[52],"encapsulation":[53],"(DEM)":[55],"hybrid":[56,179],"paradigm":[57,180],"helps":[58,170],"gain":[60,147],"time":[61,149],"efficiency.":[62,152],"Nevertheless,":[63],"long":[65],"ciphertext":[67],"still":[68],"makes":[69],"\u201couter\u201d":[71,119,143],"encryption":[72],"less":[73,186],"efficient.":[74],"We":[75],"show":[76],"that":[77,156],"be":[81,94],"applied":[82],"solely":[83],"on":[84,141],"KEM":[86,160],"part,":[87],"even":[89],"randomness":[92],"encrypted":[95],"outside":[96],"by":[99,176],"introducing":[100],"DEM.":[103],"These":[104],"reduce":[105],"length":[107],"of":[108,125,184],"ciphertext,":[111],"thus":[112],"avoiding":[113],"some":[114],"redundant":[115],"re\u2010encryptions":[116],"in":[117],"offload":[122],"as":[123,128],"much":[124],"work":[127],"possible":[129],"from":[130],"KEMs":[131],"faster":[133],"DEMs.":[134],"Combined":[135],"with":[136],"recent":[138],"improvement":[139],"made":[140],"layer,":[144],"we":[145,154],"better":[148],"space":[151],"Additionally,":[153],"prove":[155],"when":[157],"satisfies":[161],"so\u2010called":[163],"\u201ctranslatability\u201d,":[164],"proper":[166],"related\u2010key":[167],"secure":[168],"DEM":[169],"directly":[175],"applying":[177],"without":[181],"any":[182],"use":[183],"efficient":[187],"structure.":[189],"Copyright":[190],"\u00a9":[191],"2015":[192],"John":[193],"Wiley":[194],"&":[195],"Sons,":[196],"Ltd.":[197]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1927804796","counts_by_year":[],"updated_date":"2024-12-10T06:10:03.139052","created_date":"2016-06-24"}