{"id":"https://openalex.org/W2766497172","doi":"https://doi.org/10.1007/978-3-319-68637-0_21","title":"Provably Secure Homomorphic Signcryption","display_name":"Provably Secure Homomorphic Signcryption","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2766497172","doi":"https://doi.org/10.1007/978-3-319-68637-0_21","mag":"2766497172"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-68637-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68637-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020136354","display_name":"Fatemeh Rezaeibagha","orcid":"https://orcid.org/0000-0002-1368-016X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Fatemeh Rezaeibagha","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100449695","display_name":"Shiwei Zhang","orcid":"https://orcid.org/0000-0002-0357-7185"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shiwei Zhang","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101738239","display_name":"Xiaofen Wang","orcid":"https://orcid.org/0000-0002-6744-4752"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaofen Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, 611731, Sichuan, China","Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems and Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, 541004, Gunagxi, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, 611731, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems and Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, 541004, Gunagxi, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020136354","https://openalex.org/A5101738239"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I204824540","https://openalex.org/I5343935"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.9772,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.89570868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"349","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9855968952178955},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9391977787017822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8228549957275391},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5868724584579468},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5013525485992432},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5009346008300781},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4921724200248718},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4761274456977844},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.4396211802959442},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.41173556447029114},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2970205545425415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2136545479297638},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.150409996509552},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.08067587018013}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9855968952178955},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9391977787017822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8228549957275391},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5868724584579468},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5013525485992432},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5009346008300781},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4921724200248718},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4761274456977844},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.4396211802959442},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.41173556447029114},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2970205545425415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2136545479297638},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.150409996509552},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.08067587018013},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-68637-0_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68637-0_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:54662","is_oa":false,"landing_page_url":"https://researchrepository.murdoch.edu.au/id/eprint/54662/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Rezaeibagha, F. &lt;https://researchrepository.murdoch.edu.au/view/author/Rezaeibagha, Fatemeh.html&gt;, Mu, Y., Zhang, S. and Wang, X.   (2017)  Provably secure homomorphic signcryption.    Lecture Notes in Computer Science, 10592 .   pp. 349-360.  ","raw_type":"Journal Article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-1947","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/945","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W405661327","https://openalex.org/W924029577","https://openalex.org/W1516634197","https://openalex.org/W1534388293","https://openalex.org/W1557023607","https://openalex.org/W1594668186","https://openalex.org/W1798609567","https://openalex.org/W1874619058","https://openalex.org/W2024471472","https://openalex.org/W2031533839","https://openalex.org/W2113717903","https://openalex.org/W2132172731","https://openalex.org/W2325162793","https://openalex.org/W2350818306","https://openalex.org/W2467620307","https://openalex.org/W2475136350","https://openalex.org/W2510312775","https://openalex.org/W2520599105"],"related_works":["https://openalex.org/W2384216712","https://openalex.org/W54013283","https://openalex.org/W4247729863","https://openalex.org/W2361261002","https://openalex.org/W2030294917","https://openalex.org/W2766497172","https://openalex.org/W2954812164","https://openalex.org/W4388087842","https://openalex.org/W4296239811","https://openalex.org/W4282838625"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
