{"id":"https://openalex.org/W1968715010","doi":"https://doi.org/10.1016/j.entcs.2004.05.018","title":"On the Relative Soundness of the Free Algebra Model for Public Key Encryption","display_name":"On the Relative Soundness of the Free Algebra Model for Public Key Encryption","publication_year":2005,"publication_date":"2005-03-01","ids":{"openalex":"https://openalex.org/W1968715010","doi":"https://doi.org/10.1016/j.entcs.2004.05.018","mag":"1968715010"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.018","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.entcs.2004.05.018","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051586876","display_name":"Christopher S. Lynch","orcid":"https://orcid.org/0000-0001-9989-7097"},"institutions":[{"id":"https://openalex.org/I16944753","display_name":"Clarkson University","ror":"https://ror.org/03rwgpn18","country_code":"US","type":"funder","lineage":["https://openalex.org/I16944753"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher Lynch","raw_affiliation_strings":["Department of Mathematics and Computer Science, Clarkson Universtity, Potsdam, NY 13699-5815"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Clarkson Universtity, Potsdam, NY 13699-5815","institution_ids":["https://openalex.org/I16944753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021410622","display_name":"Catherine Meadows","orcid":"https://orcid.org/0009-0006-0673-711X"},"institutions":[{"id":"https://openalex.org/I4388482696","display_name":"Naval Research Laboratory Information Technology Division","ror":"https://ror.org/04xfp8b22","country_code":null,"type":"government","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028","https://openalex.org/I4388482696"]},{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"funder","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Catherine Meadows","raw_affiliation_strings":["Naval Research Laboratory, Center for High Assurance Computer Systems, Code 5543, Washington, DC 20375#TAB#"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory, Center for High Assurance Computer Systems, Code 5543, Washington, DC 20375#TAB#","institution_ids":["https://openalex.org/I4388482696","https://openalex.org/I1288214837"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.572,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":27,"citation_normalized_percentile":{"value":0.905241,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"125","issue":"1","first_page":"43","last_page":"54"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.6323092}],"concepts":[{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.6323092},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.61359704},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.604167},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5737988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5616816},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.52544135},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5223328},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5167657},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42546278},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3604836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2783773},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17199874}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.018","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.018","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.77}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1569881051","https://openalex.org/W1597765364","https://openalex.org/W1867986337","https://openalex.org/W2003915781","https://openalex.org/W2092548536","https://openalex.org/W2126338744","https://openalex.org/W2132898941","https://openalex.org/W2133126578","https://openalex.org/W2139596501","https://openalex.org/W2150426251","https://openalex.org/W2915470408","https://openalex.org/W3162919972","https://openalex.org/W51944995"],"related_works":["https://openalex.org/W3013039523","https://openalex.org/W2913945095","https://openalex.org/W2810722548","https://openalex.org/W2186793662","https://openalex.org/W2150776565","https://openalex.org/W2087971791","https://openalex.org/W2065354390","https://openalex.org/W183552375","https://openalex.org/W1538016627","https://openalex.org/W1502535508"],"abstract_inverted_index":{"Formal":[0],"systems":[1],"for":[2,55,78,95,120,153,160,169,180],"cryptographic":[3],"protocol":[4,102,121,181],"analysis":[5],"typically":[6],"model":[7,157],"cryptosystems":[8],"in":[9,20,166],"terms":[10,21],"of":[11,17,22,64,100,105],"free":[12,45,97,155],"algebras.":[13],"Modeling":[14],"the":[15,62,101,106,154,161,167],"behavior":[16],"a":[18,96],"cryptosystem":[19],"rewrite":[23,40,109,162],"rules":[24,41],"is":[25],"more":[26,48],"expressive,":[27],"however,":[28],"and":[29,50,82],"there":[30],"are":[31,42,47],"some":[32],"attacks":[33],"that":[34,89],"can":[35,141],"only":[36],"be":[37,53,142],"discovered":[38],"when":[39],"used.":[43],"But":[44],"algebras":[46],"efficient,":[49],"appear":[51],"to":[52,144,176],"sound":[54],"\u201cmost\u201d":[56],"protocols.":[57],"In":[58,133],"[J.":[59],"Millen,":[60],"\u201cOn":[61],"freedom":[63],"decryption\u201d,":[65],"Information":[66],"Processing":[67],"Letters":[68],"86":[69],"(6)":[70],"(June":[71],"2003)":[72],"329\u2013333]":[73],"Millen":[74],"formalizes":[75],"this":[76,134],"intuition":[77],"shared":[79,170],"key":[80,127,146,171],"cryptography":[81,128],"provides":[83],"conditions":[84,91,113,149,174],"under":[85,92,150],"which":[86,93,151],"it":[87],"holds;":[88],"is,":[90],"security":[94,104,152,159],"algebra":[98,156],"version":[99,107],"implies":[103,158],"using":[108],"rules.":[110],"Moreover,":[111],"these":[112],"fit":[114],"well":[115],"with":[116],"accepted":[117],"best":[118,178],"practice":[119,179],"design.":[122,182],"However,":[123],"he":[124],"left":[125],"public":[126,145],"as":[129],"an":[130],"open":[131],"problem.":[132],"paper,":[135],"we":[136],"show":[137],"how":[138],"Millen's":[139],"approach":[140],"extended":[143],"cryptography,":[147,172],"giving":[148],"rule":[163],"model.":[164],"As":[165],"case":[168],"our":[173],"correspond":[175],"standard":[177]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1968715010","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2025-03-23T10:10:25.887216","created_date":"2016-06-24"}