{"id":"https://openalex.org/W2268693307","doi":"https://doi.org/10.1587/transfun.e99.a.590","title":"Public-Key Encryption with Lazy Parties","display_name":"Public-Key Encryption with Lazy Parties","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2268693307","doi":"https://doi.org/10.1587/transfun.e99.a.590","mag":"2268693307"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.e99.a.590","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprint.iacr.org/2013/876.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080094737","display_name":"Kenji Yasunaga","orcid":"https://orcid.org/0000-0002-5552-8457"},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"funder","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kenji YASUNAGA","raw_affiliation_strings":["Institute of Science and Engineering, Kanazawa University"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University","institution_ids":["https://openalex.org/I10091056"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5080094737"],"corresponding_institution_ids":["https://openalex.org/I10091056"],"apc_list":null,"apc_paid":null,"fwci":0.962,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.745839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"E99.A","issue":"2","first_page":"590","last_page":"600"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6446757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.57126164},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5614982},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5280824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43914172}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.e99.a.590","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.7072","pdf_url":"http://eprint.iacr.org/2013/876.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.7072","pdf_url":"http://eprint.iacr.org/2013/876.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W1496938880","https://openalex.org/W1516634197","https://openalex.org/W1593825839","https://openalex.org/W168843841","https://openalex.org/W170957052","https://openalex.org/W1762923089","https://openalex.org/W1922720366","https://openalex.org/W1969882998","https://openalex.org/W2004436277","https://openalex.org/W2077734015","https://openalex.org/W2096430557","https://openalex.org/W2101022010","https://openalex.org/W2108854854","https://openalex.org/W2111556950","https://openalex.org/W2118179522","https://openalex.org/W2120391870","https://openalex.org/W2139782093","https://openalex.org/W2167783413","https://openalex.org/W2168325212","https://openalex.org/W2199385070","https://openalex.org/W2216069195","https://openalex.org/W2254427680","https://openalex.org/W2259141738","https://openalex.org/W2396636831","https://openalex.org/W2466425706","https://openalex.org/W2508573783","https://openalex.org/W37722159","https://openalex.org/W4211120077"],"related_works":["https://openalex.org/W4243688874","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2154930424","https://openalex.org/W2129094995","https://openalex.org/W2126037447","https://openalex.org/W2081673223"],"abstract_inverted_index":{"In":[0,42,76],"a":[1,6,15,59,73,78,91,120,164,187,193,201,209],"public-key":[2,98,116,223],"encryption":[3,99,175,212,224],"scheme,":[4],"if":[5,190],"sender":[7],"is":[8,18,34,129,181,200],"not":[9,64,215],"concerned":[10,65],"about":[11,66],"the":[12,24,27,37,40,67,70,105,110,126,179,197,206],"security":[13,25,68,165],"of":[14,26,39,69,112],"message":[16,29],"and":[17,86,136,162,170,196],"unwilling":[19,88],"to":[20,89,130,158],"generate":[21,131],"costly":[22,92,127,141],"randomness,":[23],"encrypted":[28],"can":[30,138],"be":[31],"compromised.":[32],"This":[33],"caused":[35],"by":[36,183],"laziness":[38],"sender.":[41],"this":[43],"work,":[44],"we":[45,118,220],"characterize":[46],"lazy":[47,101,113,150,168,184,218,230],"parties":[48,52,57,114,137,151,169,185],"in":[49,58,72,82,96,115,124,134,186],"cryptography.":[50],"Lazy":[51],"are":[53,63,87,227],"regarded":[54],"as":[55,104,152],"honest":[56],"protocol,":[60],"but":[61],"they":[62,80,191],"protocol":[71],"certain":[74],"situation.":[75],"such":[77],"situation,":[79],"behave":[81],"an":[83,171],"honest-looking":[84],"way,":[85],"do":[90],"task.":[93],"We":[94,148],"study,":[95],"particular,":[97],"with":[100],"parties.":[102,231],"Specifically,":[103],"first":[106],"step":[107],"toward":[108],"understanding":[109],"behavior":[111],"encryption,":[117],"consider":[119],"rather":[121],"simple":[122],"setting":[123],"which":[125],"task":[128],"randomness":[132,143],"used":[133],"algorithms,":[135],"choose":[139],"either":[140],"good":[142,202],"or":[144],"cheap":[145],"bad":[146],"randomness.":[147],"model":[149],"rational":[153],"players":[154],"who":[155],"behaves":[156],"rationally":[157],"maximize":[159],"their":[160],"utilities,":[161],"define":[163],"game":[166,180],"between":[167],"adversary.":[172],"A":[173],"secure":[174,188,211,228],"scheme":[176,213],"requires":[177],"that":[178,226],"conducted":[182],"way":[189],"follow":[192],"prescribed":[194,198],"strategy,":[195],"strategy":[199],"equilibrium":[203],"solution":[204],"for":[205,217,229],"game.":[207],"Since":[208],"standard":[210],"does":[214],"work":[216],"parties,":[219],"present":[221],"some":[222],"schemes":[225]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2268693307","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-03-17T15:23:49.640323","created_date":"2016-06-24"}