{"id":"https://openalex.org/W2060709380","doi":"https://doi.org/10.1049/iet-com:20070449","title":"Analysis of an authenticated identity-based multicast scheme","display_name":"Analysis of an authenticated identity-based multicast scheme","publication_year":2008,"publication_date":"2008-07-25","ids":{"openalex":"https://openalex.org/W2060709380","doi":"https://doi.org/10.1049/iet-com:20070449","mag":"2060709380"},"language":"en","primary_location":{"id":"doi:10.1049/iet-com:20070449","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-com:20070449","pdf_url":null,"source":{"id":"https://openalex.org/S85427048","display_name":"IET Communications","issn_l":"1751-8628","issn":["1751-8628","1751-8636"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103492952","display_name":"X.-J. Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"X.-J. Lin","raw_affiliation_strings":["Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China","Graduate School of Chinese Academy of Sciences, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101611530","display_name":"Chuan-Kun Wu","orcid":"https://orcid.org/0000-0002-5620-8914"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"C.-K. Wu","raw_affiliation_strings":["Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":null,"display_name":"F. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"F. Liu","raw_affiliation_strings":["Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China","Graduate School of Chinese Academy of Sciences, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Institute of Software, The State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103492952"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":null,"fwci":1.173,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84279524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"7","first_page":"935","last_page":"937"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6815280914306641},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.6658316850662231},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5946441292762756},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5550906658172607},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.489569753408432},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.4733864367008209},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4316031336784363},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.42801904678344727},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.423788458108902},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3231552243232727},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2426394522190094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23862487077713013},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.20539453625679016},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.13073980808258057},{"id":"https://openalex.org/keywords/pragmatic-general-multicast","display_name":"Pragmatic General Multicast","score":0.12059104442596436}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6815280914306641},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.6658316850662231},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5946441292762756},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5550906658172607},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.489569753408432},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.4733864367008209},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4316031336784363},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.42801904678344727},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.423788458108902},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3231552243232727},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2426394522190094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23862487077713013},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.20539453625679016},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.13073980808258057},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.12059104442596436},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1049/iet-com:20070449","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-com:20070449","pdf_url":null,"source":{"id":"https://openalex.org/S85427048","display_name":"IET Communications","issn_l":"1751-8628","issn":["1751-8628","1751-8636"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2000548306","https://openalex.org/W2031887679","https://openalex.org/W2095708839","https://openalex.org/W2108834246","https://openalex.org/W2134330814"],"related_works":["https://openalex.org/W2134786641","https://openalex.org/W2392241939","https://openalex.org/W2131889780","https://openalex.org/W16488363","https://openalex.org/W2379693083","https://openalex.org/W2375512742","https://openalex.org/W2368683765","https://openalex.org/W900787828","https://openalex.org/W3031443138","https://openalex.org/W2032597918"],"abstract_inverted_index":{"In":[0],"IEE":[1],"Proceedings":[2],"Communications,":[3],"2005,":[4],"152,":[5],"(6),":[6],"an":[7,44],"efficient":[8],"authenticated":[9],"identity-based":[10],"multicast":[11],"scheme":[12,22,39],"from":[13],"bilinear":[14],"pairing":[15],"was":[16],"proposed.":[17],"Wang":[18],"proved":[19],"that":[20,37],"the":[21,26],"is":[23,35,40],"secure":[24,42],"against":[25,43],"adversary":[27],"who":[28],"can":[29],"forge":[30],"a":[31],"ciphertext,":[32],"but":[33],"it":[34],"shown":[36],"their":[38],"not":[41],"inside":[45],"forger.":[46]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
