{"id":"https://openalex.org/W3160315630","doi":"https://doi.org/10.1007/978-3-030-75245-3_26","title":"Multi-Client Functional Encryption for Separable Functions","display_name":"Multi-Client Functional Encryption for Separable Functions","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3160315630","doi":"https://doi.org/10.1007/978-3-030-75245-3_26","mag":"3160315630"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-75245-3_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75245-3_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.research.ed.ac.uk/en/publications/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011306482","display_name":"Michele Ciampi","orcid":"https://orcid.org/0000-0001-5062-0388"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Michele Ciampi","raw_affiliation_strings":["The University of Edinburgh, Edinburgh, UK"],"raw_orcid":"https://orcid.org/0000-0001-5062-0388","affiliations":[{"raw_affiliation_string":"The University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000845142","display_name":"Luisa Siniscalchi","orcid":"https://orcid.org/0000-0003-1813-1132"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Luisa Siniscalchi","raw_affiliation_strings":["Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060714326","display_name":"Hendrik Waldner","orcid":"https://orcid.org/0000-0002-9083-5794"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hendrik Waldner","raw_affiliation_strings":["The University of Edinburgh, Edinburgh, UK"],"raw_orcid":"https://orcid.org/0000-0002-9083-5794","affiliations":[{"raw_affiliation_string":"The University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011306482"],"corresponding_institution_ids":["https://openalex.org/I98677209"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.4361,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82665367,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"724","last_page":"753"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.902411162853241},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7414347529411316},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7075884342193604},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6994497179985046},{"id":"https://openalex.org/keywords/separable-space","display_name":"Separable space","score":0.6827617287635803},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6593627333641052},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5193582773208618},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.49333181977272034},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4899062514305115},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4860246777534485},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.39696046710014343},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32971370220184326},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25118085741996765},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12453994154930115},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11906081438064575},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.06683486700057983},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.05421048402786255}],"concepts":[{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.902411162853241},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7414347529411316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7075884342193604},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6994497179985046},{"id":"https://openalex.org/C70710897","wikidata":"https://www.wikidata.org/wiki/Q680081","display_name":"Separable space","level":2,"score":0.6827617287635803},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6593627333641052},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5193582773208618},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.49333181977272034},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4899062514305115},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4860246777534485},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.39696046710014343},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32971370220184326},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25118085741996765},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12453994154930115},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11906081438064575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06683486700057983},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.05421048402786255},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-030-75245-3_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75245-3_26","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:publications/05f637db-bb43-49c5-8673-1d3bc2617b14","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85106419816&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400063","display_name":"Scopus (Elsevier)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ciampi, M, Siniscalchi, L & Waldner, H 2021, Multi-Client Functional Encryption for Separable Functions. in J A Garay (ed.), Public-Key Cryptography \u2013 PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10\u201313, 2021, Proceedings, Part I. Springer, Lecture Notes in Computer Science, vol. LNCS 12710, pp. 724-753, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, Virtual, Online, 10/05/2021. https://doi.org/10.1007/978-3-030-75245-3_26","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ciampi, M, Siniscalchi, L & Waldner, H 2021, Multi-Client Functional Encryption for Separable Functions. in J A Garay (ed.), Public-Key Cryptography -- PKC 2021. Lecture Notes in Computer Science, vol. 12710, Cham, pp. 724-753, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 10/05/21. https://doi.org/10.1007/978-3-030-75245-3_26","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","is_oa":false,"landing_page_url":"https://link.springer.com/chapter/10.1007/978-3-030-75245-3_26","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.ed.ac.uk:openaire/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/545e0ec5-5f27-4c72-a0c2-509438b7bbb8","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ciampi, M, Siniscalchi, L & Waldner, H 2021, Multi-Client Functional Encryption for Separable Functions. in J A Garay (ed.), Public-Key Cryptography -- PKC 2021. Lecture Notes in Computer Science, vol. 12710, Cham, pp. 724-753, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 10/05/21. https://doi.org/10.1007/978-3-030-75245-3_26","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3924920570","display_name":"Functional Encryption Technologies","funder_award_id":"780108","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4865712742","display_name":"Privacy-Enhancing Cryptography in Distributed Ledgers","funder_award_id":"780477","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7842005466","display_name":null,"funder_award_id":"Horizon 2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W16762060","https://openalex.org/W65414435","https://openalex.org/W1485683924","https://openalex.org/W1546167911","https://openalex.org/W1724472458","https://openalex.org/W1976420017","https://openalex.org/W2054904172","https://openalex.org/W2078381259","https://openalex.org/W2088492763","https://openalex.org/W2117759786","https://openalex.org/W2119098504","https://openalex.org/W2161508639","https://openalex.org/W2173213060","https://openalex.org/W2293331969","https://openalex.org/W2294163655","https://openalex.org/W2295244449","https://openalex.org/W2295764142","https://openalex.org/W2497530904","https://openalex.org/W2592460471","https://openalex.org/W2605617287","https://openalex.org/W2608091826","https://openalex.org/W2637740358","https://openalex.org/W2787005258","https://openalex.org/W2790925836","https://openalex.org/W2794753592","https://openalex.org/W2918900813","https://openalex.org/W2946759674","https://openalex.org/W2990959569","https://openalex.org/W3003550720","https://openalex.org/W3013668697","https://openalex.org/W3046311706"],"related_works":["https://openalex.org/W2789659269","https://openalex.org/W4240253816","https://openalex.org/W3096456556","https://openalex.org/W2169584677","https://openalex.org/W2979513934","https://openalex.org/W4232954277","https://openalex.org/W4312876707","https://openalex.org/W2020341030","https://openalex.org/W1545749435","https://openalex.org/W2241147170"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
