{"id":"https://openalex.org/W55044320","doi":"https://doi.org/10.1007/978-3-642-29101-2_4","title":"Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack","display_name":"Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W55044320","doi":"https://doi.org/10.1007/978-3-642-29101-2_4","mag":"55044320"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-29101-2_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101814661","display_name":"Chong-zhi Gao","orcid":"https://orcid.org/0000-0001-7778-6775"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chong-zhi Gao","raw_affiliation_strings":["Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","School of Computer Science, Guangzhou University, Guangzhou, 510006, China","School of Computer Science, Guangzhou University, Guangzhou, China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088488171","display_name":"Dongqing Xie","orcid":"https://orcid.org/0000-0003-2084-3075"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongqing Xie","raw_affiliation_strings":["School of Computer Science, Guangzhou University, Guangzhou, 510006, China","School of Computer Science, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110280288","display_name":"Baodian Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baodian Wei","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou, 510006, China","Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101814661"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I37987034"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.2688,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78968177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138072490692139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6122578382492065},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5486083030700684},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.48529642820358276},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1839037537574768},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16651636362075806},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.08908972144126892}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138072490692139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6122578382492065},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5486083030700684},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.48529642820358276},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1839037537574768},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16651636362075806},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.08908972144126892}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-29101-2_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W96869510","https://openalex.org/W131568003","https://openalex.org/W1506617097","https://openalex.org/W1516512945","https://openalex.org/W1527450129","https://openalex.org/W1589176872","https://openalex.org/W1593983767","https://openalex.org/W1604454960","https://openalex.org/W1659664084","https://openalex.org/W1807462631","https://openalex.org/W1988245294","https://openalex.org/W2073210531","https://openalex.org/W2117376962","https://openalex.org/W2137390886","https://openalex.org/W2165111290","https://openalex.org/W2475786860","https://openalex.org/W2479682916","https://openalex.org/W2493671158","https://openalex.org/W2495595500","https://openalex.org/W2568714115","https://openalex.org/W2912863417","https://openalex.org/W4205096886"],"related_works":["https://openalex.org/W3029058925","https://openalex.org/W2015940479","https://openalex.org/W2096211577","https://openalex.org/W2363701519","https://openalex.org/W2991416436","https://openalex.org/W1589129854","https://openalex.org/W1939781145","https://openalex.org/W2383331906","https://openalex.org/W2355126378","https://openalex.org/W1892002809"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
