{"id":"https://openalex.org/W1991914881","doi":"https://doi.org/10.1007/s00145-007-0211-0","title":"Formal Proofs for the Security of Signcryption","display_name":"Formal Proofs for the Security of Signcryption","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W1991914881","doi":"https://doi.org/10.1007/s00145-007-0211-0","mag":"1991914881"},"language":"en","primary_location":{"id":"doi:10.1007/s00145-007-0211-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00145-007-0211-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00145-007-0211-0.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/s00145-007-0211-0.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore","Institute for Infocomm Research, 21, Heng Mui Keng Terrace Singapore 119613, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Institute for Infocomm Research, 21, Heng Mui Keng Terrace Singapore 119613, Singapore#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013548422","display_name":"Ron Steinfeld","orcid":"https://orcid.org/0000-0003-1745-4183"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ron Steinfeld","raw_affiliation_strings":["Department of Computing, Macquarie University, North Ryde, NSW 2109, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, North Ryde, NSW 2109, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000813695","display_name":"Yuliang Zheng","orcid":"https://orcid.org/0000-0002-9815-9727"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuliang Zheng","raw_affiliation_strings":["Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, NC 28223, USA","Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC 28223 USA"],"affiliations":[{"raw_affiliation_string":"Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, NC 28223, USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC 28223 USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088366326"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":34.8217,"has_fulltext":true,"cited_by_count":186,"citation_normalized_percentile":{"value":0.99758182,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"20","issue":"2","first_page":"203","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9942370653152466},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9374889135360718},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7303217649459839},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6729268431663513},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.630872368812561},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5711037516593933},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.514470100402832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4883808493614197},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4728952944278717},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.4726506769657135},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4544232189655304},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4204106628894806},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41757506132125854},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.417348712682724},{"id":"https://openalex.org/keywords/standard-model","display_name":"Standard Model (mathematical formulation)","score":0.4140142798423767},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3170439302921295},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2546955943107605},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23597383499145508},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.228841632604599}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9942370653152466},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9374889135360718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7303217649459839},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6729268431663513},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.630872368812561},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5711037516593933},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.514470100402832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4883808493614197},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4728952944278717},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.4726506769657135},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4544232189655304},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4204106628894806},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41757506132125854},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.417348712682724},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.4140142798423767},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3170439302921295},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2546955943107605},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23597383499145508},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.228841632604599},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C40976572","wikidata":"https://www.wikidata.org/wiki/Q2330873","display_name":"Gauge (firearms)","level":2,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/s00145-007-0211-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00145-007-0211-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00145-007-0211-0.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.13.4427","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4427","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://phd.pscit.monash.edu.au/joonsang/publications/pkc02.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.130.4585","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.4585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sis.uncc.edu/~yzheng/publications/files/pkc02-SCProof-p80.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.158.3484","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.3484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sis.uncc.edu/~yzheng/publications/files/BaekSteifeldZheng-fsps-joc-bsz-261206.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.621.8680","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.621.8680","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.signcryption.org/publications/pdffiles/BaekSteinfeldZheng-SCProof-pkc02-fnl.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s00145-007-0211-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00145-007-0211-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00145-007-0211-0.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320971","display_name":"Monash University","ror":"https://ror.org/02bfwt286"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1991914881.pdf","grobid_xml":"https://content.openalex.org/works/W1991914881.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W172965119","https://openalex.org/W1489642236","https://openalex.org/W1504307241","https://openalex.org/W1516512945","https://openalex.org/W1516634197","https://openalex.org/W1551910192","https://openalex.org/W1552695147","https://openalex.org/W1572695506","https://openalex.org/W1586972594","https://openalex.org/W1589034595","https://openalex.org/W1589586740","https://openalex.org/W1594742286","https://openalex.org/W1599446772","https://openalex.org/W1656028867","https://openalex.org/W1871739018","https://openalex.org/W2052267638","https://openalex.org/W2073210531","https://openalex.org/W2101803085","https://openalex.org/W2103627472","https://openalex.org/W2106583429","https://openalex.org/W2108834246","https://openalex.org/W2109365488","https://openalex.org/W2113999696","https://openalex.org/W2139172211","https://openalex.org/W2145227448","https://openalex.org/W2146319100","https://openalex.org/W2151413173","https://openalex.org/W2152723805","https://openalex.org/W2163923040","https://openalex.org/W2169194339","https://openalex.org/W2224364690","https://openalex.org/W2284345771","https://openalex.org/W2404275717","https://openalex.org/W2613792733","https://openalex.org/W3017235893","https://openalex.org/W3030755847","https://openalex.org/W3032391242","https://openalex.org/W3182100456","https://openalex.org/W4210300416"],"related_works":["https://openalex.org/W2377011442","https://openalex.org/W1892728574","https://openalex.org/W1513652919","https://openalex.org/W4297693194","https://openalex.org/W2166477497","https://openalex.org/W4239074508","https://openalex.org/W2127102636","https://openalex.org/W1993194779","https://openalex.org/W2369737298","https://openalex.org/W1975430173"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":12},{"year":2012,"cited_by_count":8}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
