{"id":"https://openalex.org/W139191574","doi":"https://doi.org/10.1007/978-3-642-39059-3_10","title":"Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem","display_name":"Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W139191574","doi":"https://doi.org/10.1007/978-3-642-39059-3_10","mag":"139191574"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-39059-3_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39059-3_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005934640","display_name":"Baodong Qin","orcid":"https://orcid.org/0000-0001-7617-5462"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baodong Qin","raw_affiliation_strings":["College of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Shanghai Jiao Tong University","Southwest University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Southwest University of Science and Technology","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101899981","display_name":"Shengli Liu","orcid":"https://orcid.org/0000-0003-1366-8256"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengli Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Shanghai Jiao Tong Univ"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Shanghai Jiao Tong Univ","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012032837","display_name":"Zhengan Huang","orcid":"https://orcid.org/0000-0003-3509-787X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengan Huang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Shanghai Jiao Tong Univ"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Shanghai Jiao Tong Univ","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005934640"],"corresponding_institution_ids":["https://openalex.org/I1297991670","https://openalex.org/I183067930"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.0184,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76701678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"136","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6973185539245605},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6441341638565063},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5286999940872192},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5222978591918945},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5115464925765991},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5051653981208801},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48876452445983887},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.47919711470603943},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4636233150959015},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4521290957927704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2670722007751465},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.258755087852478}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6973185539245605},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6441341638565063},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5286999940872192},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5222978591918945},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5115464925765991},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5051653981208801},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48876452445983887},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.47919711470603943},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4636233150959015},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4521290957927704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2670722007751465},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.258755087852478}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-39059-3_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39059-3_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W9192823","https://openalex.org/W12398441","https://openalex.org/W147235090","https://openalex.org/W157865340","https://openalex.org/W178401393","https://openalex.org/W1485489906","https://openalex.org/W1485544780","https://openalex.org/W1492390108","https://openalex.org/W1507575253","https://openalex.org/W1511374591","https://openalex.org/W1515692266","https://openalex.org/W1532961226","https://openalex.org/W1533139329","https://openalex.org/W1543879005","https://openalex.org/W1548963432","https://openalex.org/W1589176872","https://openalex.org/W1590713339","https://openalex.org/W1659664084","https://openalex.org/W1949164874","https://openalex.org/W1956945926","https://openalex.org/W2052267638","https://openalex.org/W2073210531","https://openalex.org/W2089537103","https://openalex.org/W2097215149","https://openalex.org/W2101479224","https://openalex.org/W2101803085","https://openalex.org/W2139440619","https://openalex.org/W2141395382","https://openalex.org/W2146907493","https://openalex.org/W2147436724","https://openalex.org/W2150044026","https://openalex.org/W2153971105","https://openalex.org/W2157679418","https://openalex.org/W2162287894","https://openalex.org/W2165210192","https://openalex.org/W2169265599","https://openalex.org/W2475397807","https://openalex.org/W2475786860","https://openalex.org/W2477242951","https://openalex.org/W2477827689","https://openalex.org/W2478028046","https://openalex.org/W2479682916","https://openalex.org/W2489094720","https://openalex.org/W2493993829","https://openalex.org/W2495595500","https://openalex.org/W2502627125","https://openalex.org/W2505860479","https://openalex.org/W2572799557","https://openalex.org/W4210300416","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2383065991","https://openalex.org/W2949225884","https://openalex.org/W4386242069","https://openalex.org/W1519370602","https://openalex.org/W4224241849","https://openalex.org/W4313172668","https://openalex.org/W2910586303","https://openalex.org/W4375948682","https://openalex.org/W2949171370","https://openalex.org/W1834967612"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
