{"id":"https://openalex.org/W1570572657","doi":"https://doi.org/10.1002/sec.853","title":"RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA\u2010secure KEMs to CCA\u2010secure encryptions","display_name":"RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA\u2010secure KEMs to CCA\u2010secure encryptions","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W1570572657","doi":"https://doi.org/10.1002/sec.853","mag":"1570572657"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.853","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101910792","display_name":"Yuan Chen","orcid":"https://orcid.org/0000-0003-3004-1455"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Yuan","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks ISN, Xidian University, Xi'an 710071, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks ISN, Xidian University, Xi'an 710071, China#TAB#","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102120206","display_name":"Dong Qing-kuan","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Qingkuan","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks ISN, Xidian University, Xi'an 710071, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks ISN, Xidian University, Xi'an 710071, China#TAB#","institution_ids":["https://openalex.org/I149594827"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":1.511,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.831727,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"7","issue":"8","first_page":"1219","last_page":"1231"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46537918},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.42617723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28381938},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.079128}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.853","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4,"display_name":"Partnerships for the goals"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1507330542","https://openalex.org/W1516512945","https://openalex.org/W1551910192","https://openalex.org/W1553229430","https://openalex.org/W1595386590","https://openalex.org/W1599446772","https://openalex.org/W1601869806","https://openalex.org/W1855109561","https://openalex.org/W1996182770","https://openalex.org/W2052267638","https://openalex.org/W2059832303","https://openalex.org/W2100208807","https://openalex.org/W2122987162","https://openalex.org/W2129359810","https://openalex.org/W2146907493","https://openalex.org/W2157679418","https://openalex.org/W2490262601","https://openalex.org/W2493941654","https://openalex.org/W2610863760","https://openalex.org/W36535589","https://openalex.org/W4285719527","https://openalex.org/W4323237122"],"related_works":["https://openalex.org/W3033258217","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2530322880","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2350741829","https://openalex.org/W2130043461"],"abstract_inverted_index":{"ABSTRACT":[0],"Replayable":[1],"chosen\u2010ciphertext":[2,11],"attack":[3,12],"(RCCA)":[4],"security":[5,14,43,59,98,139,158,208],"is":[6,28,60,101,171,192],"a":[7,134,155,180,195],"weaker":[8],"notion":[9,136],"than":[10,36,90,201],"(CCA)":[13],"and":[15,51,113,224],"has":[16,225],"been":[17],"proven":[18],"to":[19,30,44,104,167,214],"be":[20,83,163,212,234],"sufficient":[21,103,172],"for":[22,70,114,127,140,147,159,173,197],"several":[23],"cryptographic":[24],"tasks.":[25],"However,":[26],"it":[27],"open":[29],"construct":[31],"RCCA\u2010secure":[32,79,118,148,169],"schemes":[33,81,161],"more":[34,88],"efficient":[35,89],"CCA\u2010secure":[37,93,175],"ones.":[38,94],"This":[39,151],"paper":[40],"adapts":[41],"RCCA":[42,58,106,138,157,215],"the":[45,63,124,188,207,219],"most":[46],"popular":[47],"hybrid":[48,107,149,176,182,222],"paradigms,":[49],"KEM+DEM":[50,54],"Tag\u2010KEM/DEM.":[52],"For":[53],"paradigm,":[55,72,183],"we":[56,73,116,131,178],"show":[57,117,168,231],"consistent":[61],"with":[62],"CCA":[64],"case,":[65],"just":[66],"as":[67,143,185,194,236,238],"desired.":[68],"But":[69,95],"Tag\u2010KEM/DEM":[71],"find":[74],"some":[75],"different":[76],"status.":[77],"Natural":[78],"Tag\u2010KEM":[80],"can":[82,211,233],"easily":[84],"constructed,":[85],"which":[86],"are":[87,120],"all":[91],"existing":[92],"unfortunately,":[96],"passive":[97,128],"of":[99,111,137,190,209,221],"DEM":[100],"not":[102],"obtain":[105],"encryptions.":[108,150],"In":[109],"spite":[110],"this":[112],"completeness,":[115],"DEMs":[119],"still":[121],"sufficient.":[122],"On":[123],"other":[125],"hand,":[126],"secure":[129],"DEMs,":[130],"prove":[132],"that":[133,154,206],"stronger":[135],"Tag\u2010KEM,":[141],"named":[142,184],"tRCCA":[144,164],"security,":[145],"suffices":[146],"somewhat":[152],"suggests":[153],"benign":[156],"tag\u2010based":[160],"should":[162],"security.":[165],"Finally,":[166],"KEM":[170,191,210],"achieving":[174],"encryptions,":[177],"introduce":[179],"new":[181],"KEM/Tag\u2010DEM,":[186],"where":[187],"ciphertext":[189],"used":[193],"tag":[196],"Tag\u2010DEM":[198],"scheme":[199],"rather":[200],"reversely":[202],"in":[203],"Tag\u2010KEM/DEM,":[204],"so":[205],"weakened":[213],"one.":[216],"KEM/Tag\u2010DEM":[217],"shows":[218],"diversity":[220],"encryptions":[223],"additional":[226],"practical":[227],"values.":[228],"We":[229],"also":[230],"Tag\u2010DEMs":[232],"constructed":[235],"efficiently":[237],"DEMs.":[239],"Copyright":[240],"\u00a9":[241],"2013":[242],"John":[243],"Wiley":[244],"&":[245],"Sons,":[246],"Ltd.":[247]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1570572657","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2025-01-16T06:46:43.917335","created_date":"2016-06-24"}