{"id":"https://openalex.org/W2036165685","doi":"https://doi.org/10.1007/s11432-008-0070-9","title":"Efficient Tate pairing computation using double-base chains","display_name":"Efficient Tate pairing computation using double-base chains","publication_year":2008,"publication_date":"2008-06-18","ids":{"openalex":"https://openalex.org/W2036165685","doi":"https://doi.org/10.1007/s11432-008-0070-9","mag":"2036165685"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-008-0070-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210224633","display_name":"Science in China Series F Information Sciences","issn_l":"1009-2757","issn":["1009-2757","1862-2836"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprint.iacr.org/2006/201.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062583521","display_name":"Chang\u2010An Zhao","orcid":"https://orcid.org/0000-0002-1792-0589"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"ChangAn Zhao","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005731945","display_name":"Fangguo Zhang","orcid":"https://orcid.org/0000-0002-0486-6413"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"FangGuo Zhang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"JiWu Huang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.095,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":11,"citation_normalized_percentile":{"value":0.855408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"51","issue":"8","first_page":"1096","last_page":"1105"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9931,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.6765871},{"id":"https://openalex.org/keywords/pairing-based-cryptosystems","display_name":"Pairing-Based Cryptosystems","score":0.634657},{"id":"https://openalex.org/keywords/pairing-based-cryptography","display_name":"Pairing-based Cryptography","score":0.627971},{"id":"https://openalex.org/keywords/efficient-algorithms","display_name":"Efficient Algorithms","score":0.532745},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.508376},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure Multi-party Computation","score":0.504221}],"concepts":[{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.9192015},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.78524053},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.6765871},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.66879594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.57409817},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5171549},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44107434},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.42678443},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3572379},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33298707},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32015777},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09919968},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09092426},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-008-0070-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210224633","display_name":"Science in China Series F Information Sciences","issn_l":"1009-2757","issn":["1009-2757","1862-2836"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.1628","pdf_url":"http://eprint.iacr.org/2006/201.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.1628","pdf_url":"http://eprint.iacr.org/2006/201.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1486898453","https://openalex.org/W1487297807","https://openalex.org/W1518817958","https://openalex.org/W1518871948","https://openalex.org/W1532836984","https://openalex.org/W1537065876","https://openalex.org/W1592092778","https://openalex.org/W1610688607","https://openalex.org/W1637905077","https://openalex.org/W1971605365","https://openalex.org/W1992791812","https://openalex.org/W2003042406","https://openalex.org/W2005381286","https://openalex.org/W2032767749","https://openalex.org/W2055083041","https://openalex.org/W2065654144","https://openalex.org/W2066709282","https://openalex.org/W2071302523","https://openalex.org/W2094556471","https://openalex.org/W2097493047","https://openalex.org/W2111310412","https://openalex.org/W2114296987","https://openalex.org/W2117797270","https://openalex.org/W2152924492","https://openalex.org/W2172174332","https://openalex.org/W2336582372","https://openalex.org/W2624923838","https://openalex.org/W2950559163","https://openalex.org/W2951677121","https://openalex.org/W3154896280","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4232705780","https://openalex.org/W3201176751","https://openalex.org/W2965484163","https://openalex.org/W2790938167","https://openalex.org/W2096221836","https://openalex.org/W2057898405","https://openalex.org/W2051379014","https://openalex.org/W2029180842","https://openalex.org/W1993094293","https://openalex.org/W1485205250"],"abstract_inverted_index":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2036165685","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2024-11-24T09:57:47.110218","created_date":"2016-06-24"}