{"id":"https://openalex.org/W203803423","doi":"https://doi.org/10.1007/978-3-642-04474-8_25","title":"On the Security of Identity Based Ring Signcryption Schemes","display_name":"On the Security of Identity Based Ring Signcryption Schemes","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W203803423","doi":"https://doi.org/10.1007/978-3-642-04474-8_25","mag":"203803423"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-04474-8_25","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-04474-8_25","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112397856","display_name":"S. Sharmila Deva Selvi","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Sharmila Deva Selvi","raw_affiliation_strings":["Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008324213","display_name":"S. Sree Vivek","orcid":"https://orcid.org/0000-0002-8426-0859"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sree Vivek","raw_affiliation_strings":["Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Pandu Rangan","raw_affiliation_strings":["Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Laboratory Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112397856"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.0261,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.8695295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"325"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10304","display_name":"Geometric and Algebraic Topology","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9849252700805664},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8540135025978088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7675176858901978},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6577179431915283},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5862075686454773},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5599751472473145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5388931632041931},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5258089900016785},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5245804190635681},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5117273330688477},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.5059837698936462},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.48572975397109985},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.46109262108802795},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45636552572250366},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45261767506599426},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.44843852519989014},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4413762390613556},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43540680408477783},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.41040363907814026},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.23430585861206055},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.18208923935890198},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12964478135108948},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.06677889823913574}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9849252700805664},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8540135025978088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7675176858901978},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6577179431915283},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5862075686454773},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5599751472473145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5388931632041931},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5258089900016785},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5245804190635681},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5117273330688477},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.5059837698936462},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.48572975397109985},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.46109262108802795},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45636552572250366},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45261767506599426},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.44843852519989014},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4413762390613556},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43540680408477783},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41040363907814026},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.23430585861206055},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.18208923935890198},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12964478135108948},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.06677889823913574},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-04474-8_25","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-04474-8_25","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W183626448","https://openalex.org/W203803423","https://openalex.org/W1516634197","https://openalex.org/W1562527866","https://openalex.org/W1569083856","https://openalex.org/W1910390680","https://openalex.org/W1989452396","https://openalex.org/W2021774134","https://openalex.org/W2052854534","https://openalex.org/W2103627472","https://openalex.org/W2108122086","https://openalex.org/W2129483619","https://openalex.org/W2164063478","https://openalex.org/W2167098219","https://openalex.org/W2395443637","https://openalex.org/W3029907645"],"related_works":["https://openalex.org/W2369737298","https://openalex.org/W2894635850","https://openalex.org/W2097981222","https://openalex.org/W2383065991","https://openalex.org/W1572194399","https://openalex.org/W1821799410","https://openalex.org/W1996912717","https://openalex.org/W2356338791","https://openalex.org/W1969394015","https://openalex.org/W2063764735"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
