{"id":"https://openalex.org/W2060562832","doi":"https://doi.org/10.1504/ijact.2012.045589","title":"Dynamic attribute-based signcryption without random oracles","display_name":"Dynamic attribute-based signcryption without random oracles","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2060562832","doi":"https://doi.org/10.1504/ijact.2012.045589","mag":"2060562832"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2012.045589","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038506185","display_name":"Keita Emura","orcid":"https://orcid.org/0000-0002-8969-3581"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"funder","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keita Emura","raw_affiliation_strings":["Center for Highly Dependable Embedded Systems Technology, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan"],"affiliations":[{"raw_affiliation_string":"Center for Highly Dependable Embedded Systems Technology, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan","institution_ids":["https://openalex.org/I177738480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010929606","display_name":"Atsuko Miyaji","orcid":"https://orcid.org/0000-0001-8822-5287"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"funder","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Atsuko Miyaji","raw_affiliation_strings":["School of Information Science, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan.#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Science, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan.#TAB#","institution_ids":["https://openalex.org/I177738480"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001409592","display_name":"Mohammad Shahriar Rahman","orcid":"https://orcid.org/0000-0001-9385-4053"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"funder","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mohammad Shahriar Rahman","raw_affiliation_strings":["School of Information Science, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan.#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Science, Japan Advanced Institute of Science and Technology, Japan 1-1, Asahidai, Nomi, Ishikawa 923-1292 Japan.#TAB#","institution_ids":["https://openalex.org/I177738480"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.611,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":49,"citation_normalized_percentile":{"value":0.936338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"2","issue":"3","first_page":"199","last_page":"199"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9007526},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.5741516},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5027878},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.41211674}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9007526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6897468},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.61171865},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.60975474},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.5741516},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5027878},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4613611},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44439593},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42897332},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.41211674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3990709},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.30114123},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27812773},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2767268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24304244},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2012.045589","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.68,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":49,"referenced_works":["https://openalex.org/W1484539941","https://openalex.org/W1486255205","https://openalex.org/W1489733224","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513098086","https://openalex.org/W1516634197","https://openalex.org/W1517505812","https://openalex.org/W1517835286","https://openalex.org/W1520227725","https://openalex.org/W1524651855","https://openalex.org/W1562562771","https://openalex.org/W1568660268","https://openalex.org/W1569204576","https://openalex.org/W1578064552","https://openalex.org/W1592092778","https://openalex.org/W1603290441","https://openalex.org/W1713169079","https://openalex.org/W1760090598","https://openalex.org/W1819508773","https://openalex.org/W1976157784","https://openalex.org/W2001030614","https://openalex.org/W2033032578","https://openalex.org/W204716977","https://openalex.org/W2057636642","https://openalex.org/W2084149425","https://openalex.org/W2086042811","https://openalex.org/W2096113448","https://openalex.org/W2097638666","https://openalex.org/W2101709669","https://openalex.org/W2104939601","https://openalex.org/W2108072891","https://openalex.org/W2117616411","https://openalex.org/W2118808179","https://openalex.org/W2120551550","https://openalex.org/W2125974812","https://openalex.org/W2138001464","https://openalex.org/W2141395382","https://openalex.org/W2146985619","https://openalex.org/W2148437174","https://openalex.org/W2158926963","https://openalex.org/W2166403741","https://openalex.org/W2396804250","https://openalex.org/W2399345613","https://openalex.org/W2401712396","https://openalex.org/W2562387546","https://openalex.org/W2911424200","https://openalex.org/W3017235893"],"related_works":["https://openalex.org/W3021627001","https://openalex.org/W2594028680","https://openalex.org/W2394990921","https://openalex.org/W2383065991","https://openalex.org/W2352760668","https://openalex.org/W1832688593","https://openalex.org/W1605305207","https://openalex.org/W1587600832","https://openalex.org/W1566541866","https://openalex.org/W121525879"],"abstract_inverted_index":{"In":[0,41,63],"SCN2010,":[1],"Gagn\u00e9,":[2],"Narayan,":[3],"and":[4,28,110],"Safavi-Naini":[5],"proposed":[6],"attribute-based":[7,16,31,92],"signcryption":[8,93],"(ABSC)":[9],"with":[10,69],"threshold":[11],"structure.":[12],"As":[13],"in":[14,30,59,100],"ciphertext-policy":[15],"encryption":[17],"(CP-ABE),":[18],"an":[19],"encryptor":[20,54,76],"can":[21,36,77],"specify":[22],"the":[23,38,44,49,53,60,101,105,111],"access":[24,45,50,73],"structure":[25,46,51],"of":[26,47,52,75,85],"decryptors,":[27,48],"as":[29],"signature":[32],"(ABS),":[33],"each":[34],"decryptor":[35],"verify":[37],"encryptor's":[39],"attributes.":[40],"contrast":[42],"to":[43,56],"needs":[55],"be":[57,78],"fixed":[58],"setup":[61],"phase.":[62],"this":[64,89],"paper,":[65],"we":[66],"propose":[67],"ABSC":[68],"dynamic":[70,91],"property,":[71],"where":[72],"structures":[74],"updated":[79],"flexibly":[80],"without":[81],"re-issuing":[82],"secret":[83],"keys":[84],"users.":[86],"We":[87],"call":[88],"primitive":[90],"(DABSC).":[94],"Our":[95],"DABSC":[96],"scheme":[97],"is":[98],"secure":[99],"standard":[102],"model":[103],"under":[104],"decision":[106],"bilinear":[107],"Diffie-Hellman":[108,113],"assumption":[109],"computational":[112],"assumption.":[114]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2060562832","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":1}],"updated_date":"2025-04-19T14:20:46.947965","created_date":"2016-06-24"}