{"id":"https://openalex.org/W261436151","doi":"https://doi.org/10.1007/978-3-662-46248-5_43","title":"The New Attribute-Based Generalized Signcryption Scheme","display_name":"The New Attribute-Based Generalized Signcryption Scheme","publication_year":2014,"publication_date":"2014-12-29","ids":{"openalex":"https://openalex.org/W261436151","doi":"https://doi.org/10.1007/978-3-662-46248-5_43","mag":"261436151"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-46248-5_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-46248-5_43","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066586188","display_name":"Yiliang Han","orcid":"https://orcid.org/0000-0002-2116-5408"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiliang Han","raw_affiliation_strings":["College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082324422","display_name":"Yincheng Bai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yincheng Bai","raw_affiliation_strings":["Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China"],"affiliations":[{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065103224","display_name":"Dingyi Fang","orcid":"https://orcid.org/0000-0002-5816-6922"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingyi Fang","raw_affiliation_strings":["College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","College of Information Science and Technology, Northwest University, Xi'an, 710127, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi'an, 710127, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058435270","display_name":"Xiaoyuan Yang","orcid":"https://orcid.org/0000-0003-3865-0474"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoyuan Yang","raw_affiliation_strings":["Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China"],"affiliations":[{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Lab. of Cryptology and Information Security, Department of Electronic Technology, Engineering University of CAPF, Xi'an, 710086, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066586188"],"corresponding_institution_ids":["https://openalex.org/I37802460"],"apc_list":null,"apc_paid":null,"fwci":0.3624,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60428276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"353","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9769281148910522},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.8238958716392517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6706095337867737},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.651268482208252},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.598150372505188},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.5739309787750244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5368239283561707},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5137308835983276},{"id":"https://openalex.org/keywords/bilinear-map","display_name":"Bilinear map","score":0.4349689185619354},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.41833069920539856},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2797604501247406},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27188560366630554},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2419118583202362},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.13201966881752014}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9769281148910522},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.8238958716392517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6706095337867737},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.651268482208252},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.598150372505188},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.5739309787750244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5368239283561707},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5137308835983276},{"id":"https://openalex.org/C142685569","wikidata":"https://www.wikidata.org/wiki/Q1086961","display_name":"Bilinear map","level":3,"score":0.4349689185619354},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.41833069920539856},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2797604501247406},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27188560366630554},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2419118583202362},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.13201966881752014},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-662-46248-5_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-46248-5_43","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1495266644","https://openalex.org/W1498316612","https://openalex.org/W1516634197","https://openalex.org/W1520227725","https://openalex.org/W1569083856","https://openalex.org/W1983592712","https://openalex.org/W2084149425","https://openalex.org/W2086042811","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2166362740","https://openalex.org/W2315618926","https://openalex.org/W2329749260","https://openalex.org/W2349213514","https://openalex.org/W2364517866","https://openalex.org/W2387611889","https://openalex.org/W2388840035","https://openalex.org/W2401712396","https://openalex.org/W2490262601","https://openalex.org/W2493671158","https://openalex.org/W4235929402"],"related_works":["https://openalex.org/W2946208069","https://openalex.org/W4242229754","https://openalex.org/W1510433380","https://openalex.org/W2467984134","https://openalex.org/W1994004144","https://openalex.org/W2385243128","https://openalex.org/W2097981222","https://openalex.org/W2383065991","https://openalex.org/W1996912717","https://openalex.org/W2013261269"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
