{"id":"https://openalex.org/W3157347515","doi":"https://doi.org/10.1007/978-3-030-75245-3_16","title":"Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks","display_name":"Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3157347515","doi":"https://doi.org/10.1007/978-3-030-75245-3_16","mag":"3157347515"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-75245-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75245-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qiqi Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiqi Lai","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","School of Computer Science, Shaanxi Normal University, Xi'an, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi'an, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083215230","display_name":"Feng-Hao Liu","orcid":"https://orcid.org/0000-0003-4298-3925"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feng-Hao Liu","raw_affiliation_strings":["Florida Atlantic University, Boca Raton, USA"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, Boca Raton, USA","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001471258","display_name":"Zhedong Wang","orcid":"https://orcid.org/0000-0001-5226-2131"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhedong Wang","raw_affiliation_strings":["Florida Atlantic University, Boca Raton, USA"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, Boca Raton, USA","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I88830068"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.7952,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86468596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"421","last_page":"450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7719439268112183},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.7288487553596497},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.6669352054595947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6426409482955933},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5723768472671509},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.5323778986930847},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4929006099700928},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.48484504222869873},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4274282455444336},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40443095564842224},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3277719020843506},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3009297251701355},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.23687323927879333},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.1730727255344391},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16614994406700134},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1278609335422516},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10642638802528381}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7719439268112183},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.7288487553596497},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.6669352054595947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6426409482955933},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5723768472671509},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.5323778986930847},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4929006099700928},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.48484504222869873},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4274282455444336},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40443095564842224},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3277719020843506},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3009297251701355},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.23687323927879333},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.1730727255344391},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16614994406700134},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1278609335422516},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10642638802528381},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-75245-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75245-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W38127577","https://openalex.org/W190530026","https://openalex.org/W632084191","https://openalex.org/W1485489906","https://openalex.org/W1485544780","https://openalex.org/W1492390108","https://openalex.org/W1515692266","https://openalex.org/W1518187966","https://openalex.org/W1547517307","https://openalex.org/W1557092587","https://openalex.org/W1832187505","https://openalex.org/W1949164874","https://openalex.org/W2027528470","https://openalex.org/W2089477764","https://openalex.org/W2096290348","https://openalex.org/W2099479778","https://openalex.org/W2101479224","https://openalex.org/W2113333997","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2139440619","https://openalex.org/W2146813141","https://openalex.org/W2165111290","https://openalex.org/W2165210192","https://openalex.org/W2182904001","https://openalex.org/W2295057390","https://openalex.org/W2570008916","https://openalex.org/W2619380141","https://openalex.org/W2750848363","https://openalex.org/W2792964577","https://openalex.org/W2903348552","https://openalex.org/W2919624727","https://openalex.org/W2932093990","https://openalex.org/W4205550388","https://openalex.org/W4210300416"],"related_works":["https://openalex.org/W2963103512","https://openalex.org/W3029045823","https://openalex.org/W2400565204","https://openalex.org/W2885113919","https://openalex.org/W3121459986","https://openalex.org/W3174551526","https://openalex.org/W3003331030","https://openalex.org/W4205350912","https://openalex.org/W4394788392","https://openalex.org/W4391555859"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
