{"id":"https://openalex.org/W1490519238","doi":"https://doi.org/10.1007/978-3-642-16280-0_17","title":"Identity Based Public Verifiable Signcryption Scheme","display_name":"Identity Based Public Verifiable Signcryption Scheme","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1490519238","doi":"https://doi.org/10.1007/978-3-642-16280-0_17","mag":"1490519238"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-16280-0_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16280-0_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112397856","display_name":"S. Sharmila Deva Selvi","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Sharmila Deva Selvi","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008324213","display_name":"S. Sree Vivek","orcid":"https://orcid.org/0000-0002-8426-0859"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sree Vivek","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Pandu Rangan","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112397856"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.3985,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.93183733,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"244","last_page":"260"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9988713264465332},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.826556384563446},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7515838742256165},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7212746739387512},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6406959891319275},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6286057829856873},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6266401410102844},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.48304611444473267},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45895037055015564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4419263005256653},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.43567219376564026},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4134538173675537},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41245272755622864},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3547728955745697},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19840216636657715},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1895028054714203},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.1328861117362976},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.08342596888542175}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9988713264465332},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.826556384563446},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515838742256165},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7212746739387512},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6406959891319275},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6286057829856873},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6266401410102844},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.48304611444473267},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45895037055015564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4419263005256653},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.43567219376564026},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4134538173675537},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41245272755622864},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3547728955745697},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19840216636657715},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1895028054714203},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.1328861117362976},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.08342596888542175},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-16280-0_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16280-0_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.294.3040","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.3040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprint.iacr.org/2010/343.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1497491409","https://openalex.org/W1504092670","https://openalex.org/W1504307241","https://openalex.org/W1510433380","https://openalex.org/W1516634197","https://openalex.org/W1550179304","https://openalex.org/W1569083856","https://openalex.org/W1569204576","https://openalex.org/W1571093585","https://openalex.org/W1575626605","https://openalex.org/W1577025491","https://openalex.org/W1760090598","https://openalex.org/W2100647543","https://openalex.org/W2103627472","https://openalex.org/W2148437174","https://openalex.org/W2244448351","https://openalex.org/W2913622301","https://openalex.org/W3031434724","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2464959902","https://openalex.org/W1527397996","https://openalex.org/W2067286885","https://openalex.org/W2523655603","https://openalex.org/W2372417166","https://openalex.org/W2355766212","https://openalex.org/W1991914881","https://openalex.org/W2395443637","https://openalex.org/W1982865346","https://openalex.org/W83933145"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
