{"id":"https://openalex.org/W3201042007","doi":"https://doi.org/10.1007/978-981-16-5943-0_20","title":"Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU Variant","display_name":"Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU Variant","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3201042007","doi":"https://doi.org/10.1007/978-981-16-5943-0_20","mag":"3201042007"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-16-5943-0_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-16-5943-0_20","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100406972","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0002-3245-5849"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Wang","raw_affiliation_strings":["College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066586188","display_name":"Yiliang Han","orcid":"https://orcid.org/0000-0002-2116-5408"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiliang Han","raw_affiliation_strings":["College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005199524","display_name":"Xiaowei Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowei Duan","raw_affiliation_strings":["College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005199369","display_name":"KaiYang Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"KaiYang Guo","raw_affiliation_strings":["College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of PAP for Cryptology and Information Security, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"College of Cryptographic Engineering, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100406972"],"corresponding_institution_ids":["https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":1.0755,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79408588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"240","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.883235514163971},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8632108569145203},{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.7498409152030945},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6977424621582031},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6783069372177124},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.49313420057296753},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.4920165240764618},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.443755567073822},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.422777384519577},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.41332128643989563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3880007863044739},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.312499076128006},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19058537483215332},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0965677797794342}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.883235514163971},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8632108569145203},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.7498409152030945},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6977424621582031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6783069372177124},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.49313420057296753},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.4920165240764618},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.443755567073822},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.422777384519577},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41332128643989563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3880007863044739},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.312499076128006},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19058537483215332},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0965677797794342},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-16-5943-0_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-16-5943-0_20","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1576892942","https://openalex.org/W1590823599","https://openalex.org/W1890078278","https://openalex.org/W2008329593","https://openalex.org/W2110356978","https://openalex.org/W2114428623","https://openalex.org/W2284011465","https://openalex.org/W2756242929","https://openalex.org/W2949847148","https://openalex.org/W2997099769","https://openalex.org/W3022461538","https://openalex.org/W3045145468","https://openalex.org/W3049227096","https://openalex.org/W3113254995","https://openalex.org/W3132351737"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W2396704985","https://openalex.org/W3042932947","https://openalex.org/W1972631883","https://openalex.org/W2997442751","https://openalex.org/W2035692780","https://openalex.org/W2516093999","https://openalex.org/W2068013785","https://openalex.org/W2156318122","https://openalex.org/W3201042007"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
