{"id":"https://openalex.org/W4385654573","doi":"https://doi.org/10.1007/978-3-031-38557-5_21","title":"Two-Round Stateless Deterministic Two-Party Schnorr Signatures from\u00a0Pseudorandom Correlation Functions","display_name":"Two-Round Stateless Deterministic Two-Party Schnorr Signatures from\u00a0Pseudorandom Correlation Functions","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385654573","doi":"https://doi.org/10.1007/978-3-031-38557-5_21"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-38557-5_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38557-5_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061724724","display_name":"Yashvanth Kondi","orcid":"https://orcid.org/0009-0008-1848-9234"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Yashvanth Kondi","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028570693","display_name":"Claudio Orlandi","orcid":"https://orcid.org/0000-0003-4992-0249"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Claudio Orlandi","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050543367","display_name":"Lawrence Roy","orcid":"https://orcid.org/0009-0003-8436-0029"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Lawrence Roy","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061724724"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.4653,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.97772141,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"646","last_page":"677"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7862820029258728},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.7706788778305054},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.692237377166748},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.5159152746200562},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4990408420562744},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4732245206832886},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4661869704723358},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.43497639894485474},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4262154698371887},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.4173874258995056},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.37042802572250366},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.29913580417633057},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27932506799697876},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27512460947036743},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27420350909233093},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.17695948481559753},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15848329663276672},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.08900222182273865}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7862820029258728},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.7706788778305054},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.692237377166748},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.5159152746200562},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4990408420562744},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4732245206832886},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4661869704723358},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.43497639894485474},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4262154698371887},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.4173874258995056},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.37042802572250366},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.29913580417633057},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27932506799697876},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27512460947036743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27420350909233093},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.17695948481559753},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15848329663276672},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.08900222182273865},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-031-38557-5_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38557-5_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:publications/ef9fbb38-35a8-4d15-bb9d-e6ce772f9a28","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/ef9fbb38-35a8-4d15-bb9d-e6ce772f9a28","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kondi, Y, Orlandi, C & Roy, L 2023, Two-Round Stateless Deterministic Two-Party Schnorr Signatures from\u00a0Pseudorandom Correlation Functions. in H Handschuh & A Lysyanskaya (eds), Advances in Cryptology \u2013 CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20\u201324, 2023, Proceedings, Part I. Springer, Cham, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14081, pp. 646-677, 43rd Annual International Cryptology Conference, Santa Barbara, California, United States, 20/08/2023. https://doi.org/10.1007/978-3-031-38557-5_21","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"No poverty","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/1"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W173953576","https://openalex.org/W1498129884","https://openalex.org/W1515945955","https://openalex.org/W1520399166","https://openalex.org/W1561877077","https://openalex.org/W1730634423","https://openalex.org/W1888768993","https://openalex.org/W2025230257","https://openalex.org/W2058648304","https://openalex.org/W2076745395","https://openalex.org/W2095708839","https://openalex.org/W2103131117","https://openalex.org/W2108020916","https://openalex.org/W2115148615","https://openalex.org/W2166462813","https://openalex.org/W2170561193","https://openalex.org/W2494395658","https://openalex.org/W2577111091","https://openalex.org/W2794784663","https://openalex.org/W2883748642","https://openalex.org/W2890219821","https://openalex.org/W2890748062","https://openalex.org/W2911825405","https://openalex.org/W2927855747","https://openalex.org/W2970282636","https://openalex.org/W2993523858","https://openalex.org/W3096294846","https://openalex.org/W3096664316","https://openalex.org/W3096981287","https://openalex.org/W3107287909","https://openalex.org/W3108205245","https://openalex.org/W3126452039","https://openalex.org/W3127165609","https://openalex.org/W3157351706","https://openalex.org/W3159942927","https://openalex.org/W3164127247","https://openalex.org/W3191289991","https://openalex.org/W4206931599","https://openalex.org/W4288057776","https://openalex.org/W4291011171","https://openalex.org/W6743706254"],"related_works":["https://openalex.org/W2035312053","https://openalex.org/W2908539414","https://openalex.org/W112987992","https://openalex.org/W4400727979","https://openalex.org/W4406274650","https://openalex.org/W4246017188","https://openalex.org/W17249245","https://openalex.org/W4399010298","https://openalex.org/W2234619324","https://openalex.org/W4298846198"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-01-20T17:24:06.736184","created_date":"2025-10-10T00:00:00"}
