{"id":"https://openalex.org/W1714058014","doi":"https://doi.org/10.1007/978-3-642-12827-1_22","title":"Certificateless KEM and Hybrid Signcryption Schemes Revisited","display_name":"Certificateless KEM and Hybrid Signcryption Schemes Revisited","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1714058014","doi":"https://doi.org/10.1007/978-3-642-12827-1_22","mag":"1714058014"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-12827-1_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12827-1_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112397856","display_name":"S. Sharmila Deva Selvi","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Sharmila Deva Selvi","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008324213","display_name":"S. Sree Vivek","orcid":"https://orcid.org/0000-0002-8426-0859"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sree Vivek","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Pandu Rangan","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112397856"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.8496,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.74802788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"294","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9953330755233765},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7899123430252075},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6760537028312683},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5762434601783752},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5606245398521423},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5241886973381042},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.5219746828079224},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5066626667976379},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4796031713485718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47057077288627625},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4588393270969391},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4252273440361023},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30232250690460205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27950844168663025},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.19720971584320068},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15964004397392273},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.14674112200737}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9953330755233765},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7899123430252075},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6760537028312683},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5762434601783752},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5606245398521423},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5241886973381042},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.5219746828079224},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5066626667976379},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4796031713485718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47057077288627625},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4588393270969391},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4252273440361023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30232250690460205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27950844168663025},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.19720971584320068},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15964004397392273},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.14674112200737},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-12827-1_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12827-1_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.591.9689","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.591.9689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://eprint.iacr.org/2009/462.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W68013446","https://openalex.org/W1480306048","https://openalex.org/W1486255205","https://openalex.org/W1491611975","https://openalex.org/W1510433380","https://openalex.org/W1516634197","https://openalex.org/W1524651855","https://openalex.org/W1591524234","https://openalex.org/W1592092778","https://openalex.org/W1599446772","https://openalex.org/W1606669319","https://openalex.org/W1669988844","https://openalex.org/W1760090598","https://openalex.org/W1832688593","https://openalex.org/W2050773464","https://openalex.org/W2060411097","https://openalex.org/W2100647543","https://openalex.org/W2103627472","https://openalex.org/W2157679418","https://openalex.org/W2162823500","https://openalex.org/W2244448351","https://openalex.org/W2296328808","https://openalex.org/W2406743903","https://openalex.org/W2561675875","https://openalex.org/W2594028680","https://openalex.org/W2912926260"],"related_works":["https://openalex.org/W1527397996","https://openalex.org/W196374101","https://openalex.org/W2111058478","https://openalex.org/W2523655603","https://openalex.org/W2372417166","https://openalex.org/W2648477390","https://openalex.org/W2395443637","https://openalex.org/W1982865346","https://openalex.org/W83933145","https://openalex.org/W2383227108"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
