{"id":"https://openalex.org/W205416094","doi":"https://doi.org/10.1007/978-3-642-39077-7_2","title":"Anonymity-Preserving Public-Key Encryption: A Constructive Approach","display_name":"Anonymity-Preserving Public-Key Encryption: A Constructive Approach","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W205416094","doi":"https://doi.org/10.1007/978-3-642-39077-7_2","mag":"205416094"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-39077-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39077-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.research.ed.ac.uk/en/publications/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082774652","display_name":"Markulf Kohlweiss","orcid":"https://orcid.org/0000-0002-8660-9663"},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]},{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["GB","US"],"is_corresponding":true,"raw_author_name":"Markulf Kohlweiss","raw_affiliation_strings":["Microsoft Research, Cambridge, England","Microsoft research#TAB#"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Cambridge, England","institution_ids":["https://openalex.org/I4210164937"]},{"raw_affiliation_string":"Microsoft research#TAB#","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064085132","display_name":"Ueli Maurer","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Ueli Maurer","raw_affiliation_strings":["ETH Z\u00fcrich, Switzerland","[ETH, Zurich]"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"[ETH, Zurich]","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049076260","display_name":"Cristina Onete","orcid":"https://orcid.org/0009-0009-4638-0639"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Cristina Onete","raw_affiliation_strings":["CASED, Darmstadt University of Technology, Germany","Darmstadt Univ. of Technology#TAB#"],"affiliations":[{"raw_affiliation_string":"CASED, Darmstadt University of Technology, Germany","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"Darmstadt Univ. of Technology#TAB#","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055191549","display_name":"Bj\u00f6rn Tackmann","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Bj\u00f6rn Tackmann","raw_affiliation_strings":["ETH Z\u00fcrich, Switzerland","[ETH, Zurich]"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"[ETH, Zurich]","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028263902","display_name":"Daniele Venturi","orcid":"https://orcid.org/0000-0003-2379-8564"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Daniele Venturi","raw_affiliation_strings":["Aarhus University, Denmark","Aarhus University"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Denmark","institution_ids":["https://openalex.org/I204337017"]},{"raw_affiliation_string":"Aarhus University","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082774652"],"corresponding_institution_ids":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.734,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93902605,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479005098342896},{"id":"https://openalex.org/keywords/constructive","display_name":"Constructive","score":0.7481404542922974},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6634194254875183},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6542096138000488},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6452347040176392},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.633078932762146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6005528569221497},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4609530568122864},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14873293042182922}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479005098342896},{"id":"https://openalex.org/C2778701210","wikidata":"https://www.wikidata.org/wiki/Q28130034","display_name":"Constructive","level":3,"score":0.7481404542922974},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6634194254875183},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6542096138000488},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6452347040176392},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.633078932762146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6005528569221497},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4609530568122864},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14873293042182922},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/978-3-642-39077-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39077-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:iris.uniroma1.it:11573/960056","is_oa":false,"landing_page_url":"http://hdl.handle.net/11573/960056","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:iris.unitn.it:11572/155956","is_oa":false,"landing_page_url":"http://hdl.handle.net/11572/155956","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:pure.atira.dk:publications/bec5cd89-daec-4543-ac19-65805b80809c","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/bec5cd89-daec-4543-ac19-65805b80809c","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kohlweiss , M, Maurer , U, Onete , C, Tackmann , B & Venturi, D 2013, Anonymity-Preserving Public-Key Encryption : A Constructive Approach. in E De Cristofaro & M Wright (eds), Privacy Enhancing Technologies : 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Springer VS, Lecture Notes in Computer Science, vol. 7981, pp. 19-39, International Symposium on Privacy Enhancing Technologies, Bloomington, United States, 10/07/2013. https://doi.org/10.1007/978-3-642-39077-7_2","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kohlweiss, M, Maurer, U, Onete, C, Tackmann, B & Venturi, D 2013, Anonymity-Preserving Public-Key Encryption: A Constructive Approach. in Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. pp. 19-39, 13th Privacy Enhancing Technologies Symposium, Bloomington, IN, United States, 10/07/13. https://doi.org/10.1007/978-3-642-39077-7_2","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","is_oa":false,"landing_page_url":"http://hdl.handle.net/20.500.11820/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.ed.ac.uk:openaire/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/2fd8bd66-183f-41b6-bd61-6ca6bb5e2c44","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kohlweiss, M, Maurer, U, Onete, C, Tackmann, B & Venturi, D 2013, Anonymity-Preserving Public-Key Encryption: A Constructive Approach. in Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. pp. 19-39, 13th Privacy Enhancing Technologies Symposium, Bloomington, IN, United States, 10/07/13. https://doi.org/10.1007/978-3-642-39077-7_2","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W36535589","https://openalex.org/W142220177","https://openalex.org/W205416094","https://openalex.org/W1501696897","https://openalex.org/W1557031288","https://openalex.org/W1603537120","https://openalex.org/W1604432502","https://openalex.org/W1604692831","https://openalex.org/W1655958391","https://openalex.org/W1772901473","https://openalex.org/W2006737181","https://openalex.org/W2042301701","https://openalex.org/W2046888488","https://openalex.org/W2063547081","https://openalex.org/W2088175567","https://openalex.org/W2110740499","https://openalex.org/W2120946007","https://openalex.org/W2128740045","https://openalex.org/W2132707977","https://openalex.org/W2143215034","https://openalex.org/W2158554251","https://openalex.org/W2167606175","https://openalex.org/W2225747920","https://openalex.org/W2914405671","https://openalex.org/W2914971001","https://openalex.org/W2951459861","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W2016593366","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W4206398305","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2982648111","https://openalex.org/W2082747743","https://openalex.org/W2085151867"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
