{"id":"https://openalex.org/W1786924502","doi":"https://doi.org/10.1007/978-3-642-16342-5_6","title":"Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing","display_name":"Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1786924502","doi":"https://doi.org/10.1007/978-3-642-16342-5_6","mag":"1786924502"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-16342-5_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16342-5_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112397856","display_name":"S. Sharmila Deva Selvi","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Sharmila Deva Selvi","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008324213","display_name":"S. Sree Vivek","orcid":"https://orcid.org/0000-0002-8426-0859"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sree Vivek","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Pandu Rangan","raw_affiliation_strings":["Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India#TAB#","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112397856"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.4161,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.83204411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.969222903251648},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9075485467910767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7672532796859741},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7403402924537659},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5827929973602295},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5369133353233337},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5084613561630249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48847687244415283},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.4698057770729065},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.45350363850593567},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4534662961959839},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.4529978632926941},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.444978803396225},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2443392276763916},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.17530608177185059}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.969222903251648},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9075485467910767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7672532796859741},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7403402924537659},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5827929973602295},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5369133353233337},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5084613561630249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48847687244415283},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.4698057770729065},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.45350363850593567},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4534662961959839},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.4529978632926941},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.444978803396225},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2443392276763916},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.17530608177185059},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-16342-5_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16342-5_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.405.8339","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.405.8339","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://eprint.iacr.org/2009/298.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W68013446","https://openalex.org/W195382131","https://openalex.org/W1889467935","https://openalex.org/W2149350464","https://openalex.org/W2296328808","https://openalex.org/W4293566735"],"related_works":["https://openalex.org/W1527397996","https://openalex.org/W196374101","https://openalex.org/W2111058478","https://openalex.org/W1786924502","https://openalex.org/W2950320590","https://openalex.org/W2387773210","https://openalex.org/W2766115904","https://openalex.org/W2395443637","https://openalex.org/W1982865346","https://openalex.org/W83933145"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
