{"id":"https://openalex.org/W2898548365","doi":"https://doi.org/10.1007/978-3-030-01950-1_47","title":"PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX","display_name":"PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2898548365","doi":"https://doi.org/10.1007/978-3-030-01950-1_47","mag":"2898548365"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-01950-1_47","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-01950-1_47","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080074604","display_name":"Huorong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huorong Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075421344","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-2639-3722"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100683081","display_name":"Bingyu Li","orcid":"https://orcid.org/0000-0001-5925-1638"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingyu Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020887996","display_name":"Wangzhao Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wangzhao Cheng","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080074604"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5438,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70966845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"767","last_page":"777"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7675182819366455},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7191683053970337},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6335160732269287},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.6306880116462708},{"id":"https://openalex.org/keywords/pkcs-#1","display_name":"PKCS #1","score":0.5979724526405334},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5695112943649292},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.49566757678985596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4821864664554596},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47783350944519043},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.4746984839439392},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.4324350655078888},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4221937954425812},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41593801975250244},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.25027769804000854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18780803680419922}],"concepts":[{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7675182819366455},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7191683053970337},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6335160732269287},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.6306880116462708},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.5979724526405334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5695112943649292},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.49566757678985596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4821864664554596},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47783350944519043},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.4746984839439392},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.4324350655078888},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4221937954425812},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41593801975250244},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25027769804000854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18780803680419922}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-01950-1_47","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-01950-1_47","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W62933689","https://openalex.org/W1569778844","https://openalex.org/W1804630428","https://openalex.org/W1817682357","https://openalex.org/W2036329595","https://openalex.org/W2093460657","https://openalex.org/W2145255308","https://openalex.org/W2150620897","https://openalex.org/W2152924492","https://openalex.org/W2270478131","https://openalex.org/W2397423248","https://openalex.org/W2498405448","https://openalex.org/W2567666263","https://openalex.org/W2613229705","https://openalex.org/W2744175342","https://openalex.org/W2751696670","https://openalex.org/W2949484119","https://openalex.org/W3103085478","https://openalex.org/W6743706254"],"related_works":["https://openalex.org/W2160642957","https://openalex.org/W2281332536","https://openalex.org/W2540612917","https://openalex.org/W1608586869","https://openalex.org/W1494454048","https://openalex.org/W2600551943","https://openalex.org/W4247152202","https://openalex.org/W2980252824","https://openalex.org/W296279","https://openalex.org/W3094394851"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
