{"id":"https://openalex.org/W4313166132","doi":"https://doi.org/10.1007/978-3-031-22365-5_11","title":"Four-Round Black-Box Non-malleable Schemes from\u00a0One-Way Permutations","display_name":"Four-Round Black-Box Non-malleable Schemes from\u00a0One-Way Permutations","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4313166132","doi":"https://doi.org/10.1007/978-3-031-22365-5_11"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-22365-5_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-22365-5_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/20.500.12942/715366","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011306482","display_name":"Michele Ciampi","orcid":"https://orcid.org/0000-0001-5062-0388"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Michele Ciampi","raw_affiliation_strings":["The University of Edinburgh, Edinburgh, UK"],"raw_orcid":"https://orcid.org/0000-0001-5062-0388","affiliations":[{"raw_affiliation_string":"The University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050362134","display_name":"Emmanuela Orsini","orcid":"https://orcid.org/0000-0002-1917-1833"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Emmanuela Orsini","raw_affiliation_strings":["imec-COSIC, KU Leuven, Leuven, Belgium"],"raw_orcid":"https://orcid.org/0000-0002-1917-1833","affiliations":[{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000845142","display_name":"Luisa Siniscalchi","orcid":"https://orcid.org/0000-0003-1813-1132"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Luisa Siniscalchi","raw_affiliation_strings":["Concordium Blockchain Research Center, Aarhus, Denmark","Department Computer Science, Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0003-1813-1132","affiliations":[{"raw_affiliation_string":"Concordium Blockchain Research Center, Aarhus, Denmark","institution_ids":[]},{"raw_affiliation_string":"Department Computer Science, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011306482"],"corresponding_institution_ids":["https://openalex.org/I98677209"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.027,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81064404,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"300","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8436208963394165},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7503073215484619},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.7491050958633423},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.703633189201355},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.6461970806121826},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5915575623512268},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.5893487334251404},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5758104920387268},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5619436502456665},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5117809176445007},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27741968631744385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2636953592300415},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.246541827917099},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.15727925300598145},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1445317566394806},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12544143199920654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8436208963394165},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7503073215484619},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.7491050958633423},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.703633189201355},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.6461970806121826},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5915575623512268},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.5893487334251404},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5758104920387268},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5619436502456665},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5117809176445007},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27741968631744385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2636953592300415},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.246541827917099},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.15727925300598145},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1445317566394806},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12544143199920654},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-031-22365-5_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-22365-5_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/715366","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/715366","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"20th International Conference on Theory of Cryptography (TCC), IL, Univ Chicago, Chicago, 7-10 November 2022","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/1f03838e-8dd4-4821-8d3e-42b769be71e4","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/1f03838e-8dd4-4821-8d3e-42b769be71e4","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ciampi, M, Orsini, E & Siniscalchi, L 2022, Four-Round Black-Box Non-malleable Schemes from\u00a0One-Way Permutations. in E Kiltz & V Vaikuntanathan (eds), Theory of Cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7\u201310, 2022, Proceedings, Part II. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13748 LNCS, pp. 300-329, 20th Theory of Cryptography Conference, TCC 2022, Chicago, United States, 7/11/22. https://doi.org/10.1007/978-3-031-22365-5_11","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/1f03838e-8dd4-4821-8d3e-42b769be71e4","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2022/1543","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.ed.ac.uk:publications/1f03838e-8dd4-4821-8d3e-42b769be71e4","is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11820/1f03838e-8dd4-4821-8d3e-42b769be71e4","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ciampi, M, Orsini, E & Siniscalchi, L 2022, Four-Round Black-Box Non-malleable Schemes from\u00a0One-Way Permutations. in E Kiltz & V Vaikuntanathan (eds), Theory of Cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7\u201310, 2022, Proceedings, Part II. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13748 LNCS, pp. 300-329, 20th Theory of Cryptography Conference, TCC 2022, Chicago, United States, 7/11/22. https://doi.org/10.1007/978-3-031-22365-5_11","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/715366","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/715366","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"20th International Conference on Theory of Cryptography (TCC), IL, Univ Chicago, Chicago, 7-10 November 2022","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.49000000953674316}],"awards":[{"id":"https://openalex.org/G4435414571","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320327336","funder_display_name":"Vlaamse regering"},{"id":"https://openalex.org/G4630088254","display_name":null,"funder_award_id":"HR001120C0085","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W157767723","https://openalex.org/W198580127","https://openalex.org/W1529040095","https://openalex.org/W1576524648","https://openalex.org/W1864936342","https://openalex.org/W1904753036","https://openalex.org/W1969446695","https://openalex.org/W1978654594","https://openalex.org/W1980227445","https://openalex.org/W1997820219","https://openalex.org/W2004433870","https://openalex.org/W2017964377","https://openalex.org/W2027528470","https://openalex.org/W2033376960","https://openalex.org/W2039605106","https://openalex.org/W2042191289","https://openalex.org/W2052605513","https://openalex.org/W2071683449","https://openalex.org/W2072677341","https://openalex.org/W2077140897","https://openalex.org/W2090903439","https://openalex.org/W2093785875","https://openalex.org/W2109693837","https://openalex.org/W2158285139","https://openalex.org/W2258874952","https://openalex.org/W2400112050","https://openalex.org/W2483868393","https://openalex.org/W2561536427","https://openalex.org/W2605182384","https://openalex.org/W2739720789","https://openalex.org/W2765621996","https://openalex.org/W2794618582","https://openalex.org/W2794886607","https://openalex.org/W2798595079","https://openalex.org/W2972289928","https://openalex.org/W3032109068","https://openalex.org/W3046921815","https://openalex.org/W3116603271","https://openalex.org/W4239982965","https://openalex.org/W4285257170","https://openalex.org/W6696994111"],"related_works":["https://openalex.org/W1993458326","https://openalex.org/W2783353176","https://openalex.org/W18954787","https://openalex.org/W3158728532","https://openalex.org/W3138083505","https://openalex.org/W2949540431","https://openalex.org/W1688774097","https://openalex.org/W2494893791","https://openalex.org/W2161264062","https://openalex.org/W2996527948"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-27T08:22:11.395708","created_date":"2025-10-10T00:00:00"}
