{"id":"https://openalex.org/W2477824192","doi":"https://doi.org/10.1007/978-981-10-2053-7_47","title":"Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits","display_name":"Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2477824192","doi":"https://doi.org/10.1007/978-981-10-2053-7_47","mag":"2477824192"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-10-2053-7_47","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-2053-7_47","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100405359","display_name":"Fei Chen","orcid":"https://orcid.org/0000-0001-8132-539X"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Chen","raw_affiliation_strings":["Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066586188","display_name":"Yiliang Han","orcid":"https://orcid.org/0000-0002-2116-5408"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]},{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiliang Han","raw_affiliation_strings":["College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","College of Information Science and Technology, Northwest University, Xi\u2019an, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi\u2019an, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101540090","display_name":"Di Jiang","orcid":"https://orcid.org/0000-0003-2309-1809"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Di Jiang","raw_affiliation_strings":["Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078930726","display_name":"Xiaoce Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoce Li","raw_affiliation_strings":["Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058435270","display_name":"Xiaoyuan Yang","orcid":"https://orcid.org/0000-0003-3865-0474"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyuan Yang","raw_affiliation_strings":["Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5066586188"],"corresponding_institution_ids":["https://openalex.org/I37802460","https://openalex.org/I4210131919"],"apc_list":null,"apc_paid":null,"fwci":1.0159,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74732527,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"533","last_page":"545"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.8447531461715698},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.8139727115631104},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7354182600975037},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7241414189338684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7042636275291443},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6675996780395508},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5935825705528259},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.589163601398468},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5484011769294739},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5292743444442749},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5152481198310852},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4593617618083954},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4480019509792328},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4198077619075775},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4146907329559326},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3899920582771301},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37617364525794983},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15099722146987915},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1350300908088684},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08988389372825623},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08190011978149414}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.8447531461715698},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.8139727115631104},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7354182600975037},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7241414189338684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7042636275291443},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6675996780395508},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5935825705528259},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.589163601398468},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5484011769294739},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5292743444442749},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5152481198310852},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4593617618083954},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4480019509792328},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4198077619075775},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4146907329559326},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3899920582771301},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37617364525794983},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15099722146987915},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1350300908088684},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08988389372825623},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08190011978149414},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-10-2053-7_47","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-2053-7_47","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W61175307","https://openalex.org/W70096886","https://openalex.org/W657779747","https://openalex.org/W1025036022","https://openalex.org/W1520227725","https://openalex.org/W1564449568","https://openalex.org/W1569083856","https://openalex.org/W1915197037","https://openalex.org/W2025108237","https://openalex.org/W2060562832","https://openalex.org/W2072120086","https://openalex.org/W2138001464","https://openalex.org/W2174604763","https://openalex.org/W2271163303","https://openalex.org/W2296098703","https://openalex.org/W2395513768","https://openalex.org/W2397835572","https://openalex.org/W2401712396","https://openalex.org/W2404099924","https://openalex.org/W2404809868","https://openalex.org/W2506520897","https://openalex.org/W2561675875","https://openalex.org/W2578778878","https://openalex.org/W3031434724","https://openalex.org/W3180436772"],"related_works":["https://openalex.org/W2464959902","https://openalex.org/W2406743903","https://openalex.org/W2766650597","https://openalex.org/W2355766212","https://openalex.org/W2351488919","https://openalex.org/W2375570376","https://openalex.org/W2467984134","https://openalex.org/W1510433380","https://openalex.org/W2166477497","https://openalex.org/W2371547793"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
