{"id":"https://openalex.org/W2539831671","doi":"https://doi.org/10.1002/sec.1664","title":"Threshold attribute\u2010based signcryption and its application to authenticated key agreement","display_name":"Threshold attribute\u2010based signcryption and its application to authenticated key agreement","publication_year":2016,"publication_date":"2016-10-27","ids":{"openalex":"https://openalex.org/W2539831671","doi":"https://doi.org/10.1002/sec.1664","mag":"2539831671"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1664","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091046478","display_name":"Haibin Zheng","orcid":"https://orcid.org/0000-0001-9383-6357"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibin Zheng","raw_affiliation_strings":["School of Mathematics Shandong University Jinan China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics Shandong University Jinan China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091403237","display_name":"Jing Qin","orcid":"https://orcid.org/0000-0003-2380-0396"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Qin","raw_affiliation_strings":["School of Mathematics Shandong University Jinan China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics Shandong University Jinan China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and IT University of New South Wales Sydney Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and IT University of New South Wales Sydney Australia","institution_ids":["https://openalex.org/I114017466","https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Electronics and Information Engineering Beihang University Beijing China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering Beihang University Beijing China","institution_ids":["https://openalex.org/I82880672"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":0.725,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.860693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"9","issue":"18","first_page":"4914","last_page":"4923"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Combinatorial Optimization and Complexity Theory","score":0.9661,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.98091173},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8095795},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.605929},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.550509},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.540037},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.518019},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure Multi-party Computation","score":0.509123},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4258505}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.98091173},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81883943},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8095795},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5695106},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5610168},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5596036},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5444634},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4755913},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46403575},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4258505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41260782},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3665951},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36301398},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33852655},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.25624323},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.1878879},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1324341},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1664","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.57,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province","award_id":"ZR2012FM005"}],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1250588604","https://openalex.org/W1498316612","https://openalex.org/W1504307241","https://openalex.org/W1543874923","https://openalex.org/W1714058014","https://openalex.org/W1725149503","https://openalex.org/W2053478405","https://openalex.org/W2084149425","https://openalex.org/W2096113448","https://openalex.org/W2098983148","https://openalex.org/W2108072891","https://openalex.org/W2119360243","https://openalex.org/W2133714748","https://openalex.org/W2138001464","https://openalex.org/W2148012840","https://openalex.org/W2156186849","https://openalex.org/W2160545217","https://openalex.org/W2164428725","https://openalex.org/W2315618926","https://openalex.org/W2320472084","https://openalex.org/W2323077984","https://openalex.org/W2325057909","https://openalex.org/W2396115154","https://openalex.org/W2405586679","https://openalex.org/W2407747971","https://openalex.org/W2807244342","https://openalex.org/W3031532611"],"related_works":["https://openalex.org/W4205855542","https://openalex.org/W3029145216","https://openalex.org/W2951375780","https://openalex.org/W2949600460","https://openalex.org/W2895108071","https://openalex.org/W2555689045","https://openalex.org/W2244412136","https://openalex.org/W1993194779","https://openalex.org/W1970469519","https://openalex.org/W1490519238"],"abstract_inverted_index":{"Abstract":[0],"Signcryption":[1],"is":[2,86],"a":[3,29,80],"public":[4,15],"key":[5,16,129],"cryptosystem":[6],"that":[7],"achieves":[8,49],"the":[9,22,50,90,96,102,107,110,139,143],"functions":[10],"of":[11,24,32,52,109,141,145],"digital":[12],"signature":[13],"and":[14,55,68,95],"encryption":[17,54],"simultaneously.":[18],"It":[19],"significantly":[20],"reduces":[21],"cost":[23],"traditional":[25],"signature\u2010then\u2010encryption":[26],"approach.":[27],"Although":[28],"large":[30],"body":[31],"signcryption":[33,45,137],"schemes":[34],"have":[35,40],"been":[36,41],"proposed,":[37],"few":[38],"works":[39],"done":[42],"on":[43,120,133],"attribute\u2010based":[44,53,56,136],"(ABSC),":[46],"which":[47],"simultaneously":[48],"functionalities":[51],"signature,":[57],"two":[58],"important":[59],"cryptographic":[60],"primitives":[61],"proposed":[62],"to":[63],"enforce":[64],"fine\u2010grained":[65],"access":[66],"control":[67],"user":[69],"authentication":[70],"in":[71,101],"cloud":[72,146],"computing":[73],"applications.":[74],"In":[75],"this":[76,134],"paper,":[77],"we":[78,125],"present":[79],"threshold":[81,135],"ABSC":[82,111],"scheme.":[83],"The":[84],"scheme":[85,114],"proven":[87],"secure":[88],"under":[89],"well\u2010established":[91],"Decisional":[92],"Bilinear":[93],"Diffie\u2013Hellman":[94,99],"standard":[97,103],"Computational":[98],"assumptions":[100],"model.":[104],"Compared":[105],"with":[106],"state":[108],"art,":[112],"our":[113],"has":[115],"comparable":[116],"efficiency":[117],"without":[118],"relying":[119],"any":[121],"random":[122],"oracle.":[123],"Furthermore,":[124],"construct":[126],"an":[127],"authenticated":[128],"agreement":[130],"protocol":[131],"based":[132],"from":[138],"point":[140],"improving":[142],"security":[144],"computing.":[147],"Copyright":[148],"\u00a9":[149],"2016":[150],"John":[151],"Wiley":[152],"&":[153],"Sons,":[154],"Ltd.":[155]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2539831671","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2024-11-22T01:33:19.390999","created_date":"2016-11-04"}