{"id":"https://openalex.org/W2957499534","doi":"https://doi.org/10.1007/978-3-030-25510-7_9","title":"Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS\u201915","display_name":"Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS\u201915","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2957499534","doi":"https://doi.org/10.1007/978-3-030-25510-7_9","mag":"2957499534"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-25510-7_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-25510-7_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039068581","display_name":"Zhen Liu","orcid":"https://orcid.org/0000-0003-0083-8754"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210095018","display_name":"National Center for Mathematics and Interdisciplinary Sciences","ror":"https://ror.org/00s97k668","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210095018"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Liu","raw_affiliation_strings":["Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China","School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, China","Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I4210095018","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I4210095018","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056715913","display_name":"Yanbin Pan","orcid":"https://orcid.org/0000-0002-5591-0234"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210095018","display_name":"National Center for Mathematics and Interdisciplinary Sciences","ror":"https://ror.org/00s97k668","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210095018"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanbin Pan","raw_affiliation_strings":["Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China","Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I4210095018","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I4210095018","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003284833","display_name":"Zhenfei Zhang","orcid":"https://orcid.org/0000-0003-2692-6242"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhenfei Zhang","raw_affiliation_strings":["Algorand, Boston, USA"],"affiliations":[{"raw_affiliation_string":"Algorand, Boston, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003284833"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.3782,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83901163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.9883331060409546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8010708093643188},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.7805842161178589},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.6119661331176758},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5167335867881775},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.4891071915626526},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47516199946403503},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43863677978515625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40961650013923645},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4035436809062958},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3248063325881958},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24476227164268494},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.24134427309036255},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09918063879013062}],"concepts":[{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.9883331060409546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010708093643188},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.7805842161178589},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.6119661331176758},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5167335867881775},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.4891071915626526},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47516199946403503},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43863677978515625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40961650013923645},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4035436809062958},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3248063325881958},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24476227164268494},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.24134427309036255},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09918063879013062},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-25510-7_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-25510-7_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1531097066","https://openalex.org/W1590823599","https://openalex.org/W1607369907","https://openalex.org/W1620415689","https://openalex.org/W1675339804","https://openalex.org/W1896743460","https://openalex.org/W2008329593","https://openalex.org/W2135124252","https://openalex.org/W2137147061","https://openalex.org/W2164101323","https://openalex.org/W2168676717","https://openalex.org/W2284011465","https://openalex.org/W2491909939","https://openalex.org/W2592691626","https://openalex.org/W2741854956","https://openalex.org/W2751178779","https://openalex.org/W2779943051","https://openalex.org/W2895182117","https://openalex.org/W2949351795","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W116006482","https://openalex.org/W2950700143","https://openalex.org/W4390914201","https://openalex.org/W2008329593","https://openalex.org/W3201042007","https://openalex.org/W2084212099","https://openalex.org/W3018577942","https://openalex.org/W2186537951","https://openalex.org/W2038988682","https://openalex.org/W2957499534"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
