{"id":"https://openalex.org/W1845063898","doi":"https://doi.org/10.1007/978-3-540-69848-7_1","title":"A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus","display_name":"A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus","publication_year":2008,"publication_date":"2008-08-12","ids":{"openalex":"https://openalex.org/W1845063898","doi":"https://doi.org/10.1007/978-3-540-69848-7_1","mag":"1845063898"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-69848-7_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-69848-7_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023297521","display_name":"Zhiwei Wang","orcid":"https://orcid.org/0000-0003-2932-890X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwei Wang","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016371039","display_name":"Xuyun Nie","orcid":"https://orcid.org/0000-0003-2868-0442"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuyun Nie","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R.china","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R. China 610054#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R.china","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R. China 610054#TAB#","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035616913","display_name":"Shihui Zheng","orcid":"https://orcid.org/0000-0001-6360-5777"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shihui Zheng","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R.China 100876#TAB#","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100451611","display_name":"Zhihui Zhang","orcid":"https://orcid.org/0000-0001-8927-1154"},"institutions":[{"id":"https://openalex.org/I4210110621","display_name":"Sony (China)","ror":"https://ror.org/02qd2bv04","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210110621","https://openalex.org/I4210143797"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihui Zhang","raw_affiliation_strings":["Sony (China) Research Laboratory, \u00a0, Beijing, P.R.China","Sony (China) Research Laboratory, , Beijing, P.R.China 100080#TAB#"],"affiliations":[{"raw_affiliation_string":"Sony (China) Research Laboratory, \u00a0, Beijing, P.R.China","institution_ids":["https://openalex.org/I4210110621"]},{"raw_affiliation_string":"Sony (China) Research Laboratory, , Beijing, P.R.China 100080#TAB#","institution_ids":["https://openalex.org/I4210110621"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023297521"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3835,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63129804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5073","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7586067914962769},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.753901481628418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7318390011787415},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.718582034111023},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.710218071937561},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6086688041687012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5659548044204712},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.4941850006580353},{"id":"https://openalex.org/keywords/public-key-cryptosystem","display_name":"Public key cryptosystem","score":0.47268396615982056},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4186159074306488},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.41531145572662354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3924557566642761},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15680328011512756}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7586067914962769},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.753901481628418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7318390011787415},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.718582034111023},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.710218071937561},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6086688041687012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5659548044204712},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.4941850006580353},{"id":"https://openalex.org/C2984195096","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public key cryptosystem","level":4,"score":0.47268396615982056},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4186159074306488},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.41531145572662354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3924557566642761},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15680328011512756},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-69848-7_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-69848-7_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"mag:3161743945","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=200902241736996919","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Lecture notes in computer science","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W68643468","https://openalex.org/W975156810","https://openalex.org/W1500599925","https://openalex.org/W1508193711","https://openalex.org/W1547026537","https://openalex.org/W1552510908","https://openalex.org/W1557226095","https://openalex.org/W1568587963","https://openalex.org/W1569499052","https://openalex.org/W1573095851","https://openalex.org/W1583871653","https://openalex.org/W1588706915","https://openalex.org/W1821087317","https://openalex.org/W1844458029","https://openalex.org/W1906691896","https://openalex.org/W2048142198","https://openalex.org/W2078581514","https://openalex.org/W2089999400","https://openalex.org/W2099172492","https://openalex.org/W2100408583","https://openalex.org/W2101076499","https://openalex.org/W2114364776","https://openalex.org/W2128687423","https://openalex.org/W2128968394","https://openalex.org/W2150548144","https://openalex.org/W2561675875","https://openalex.org/W3023478445","https://openalex.org/W3111297213"],"related_works":["https://openalex.org/W1806453146","https://openalex.org/W2365427741","https://openalex.org/W2077900604","https://openalex.org/W2157130609","https://openalex.org/W807354026","https://openalex.org/W2100244348","https://openalex.org/W4206984193","https://openalex.org/W2578186728","https://openalex.org/W2184531178","https://openalex.org/W3038424828"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
