{"id":"https://openalex.org/W3118754594","doi":"https://doi.org/10.1080/23799927.2021.1873192","title":"Efficient single round attribute-based authenticated key exchange protocol","display_name":"Efficient single round attribute-based authenticated key exchange protocol","publication_year":2021,"publication_date":"2021-01-14","ids":{"openalex":"https://openalex.org/W3118754594","doi":"https://doi.org/10.1080/23799927.2021.1873192","mag":"3118754594"},"language":"en","primary_location":{"id":"doi:10.1080/23799927.2021.1873192","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1873192","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1873192?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1873192?needAccess=true","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027651873","display_name":"Suvradip Chakraborty","orcid":"https://orcid.org/0000-0002-5352-4946"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suvradip Chakraborty","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014799697","display_name":"Y. Sreenivasa Rao","orcid":"https://orcid.org/0000-0001-8701-0209"},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sreenivasa Y. Rao","raw_affiliation_strings":["Department of Mathematics, National Institute of Technology, Warangal, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Institute of Technology, Warangal, India","institution_ids":["https://openalex.org/I121750182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103487617","display_name":"C. Pandu Rangan","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Pandu Rangan","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014799697"],"corresponding_institution_ids":["https://openalex.org/I121750182"],"apc_list":null,"apc_paid":null,"fwci":0.4079,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66378012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"6","issue":"4","first_page":"313","last_page":"336"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8473759889602661},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6669458150863647},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.6219302415847778},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.5840698480606079},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.546425461769104},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.5139291286468506},{"id":"https://openalex.org/keywords/diffie\u2013hellman-key-exchange","display_name":"Diffie\u2013Hellman key exchange","score":0.5035020709037781},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4831085205078125},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46507689356803894},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.45500844717025757},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4394245445728302},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42562341690063477},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.41916608810424805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4055476188659668},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37861010432243347},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3293628692626953},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23270070552825928}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8473759889602661},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6669458150863647},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.6219302415847778},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.5840698480606079},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.546425461769104},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.5139291286468506},{"id":"https://openalex.org/C29524669","wikidata":"https://www.wikidata.org/wiki/Q623447","display_name":"Diffie\u2013Hellman key exchange","level":5,"score":0.5035020709037781},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4831085205078125},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46507689356803894},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45500844717025757},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4394245445728302},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42562341690063477},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.41916608810424805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4055476188659668},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37861010432243347},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3293628692626953},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23270070552825928},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/23799927.2021.1873192","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1873192","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1873192?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1080/23799927.2021.1873192","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1873192","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1873192?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3118754594.pdf","grobid_xml":"https://content.openalex.org/works/W3118754594.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W25351223","https://openalex.org/W97691248","https://openalex.org/W205458998","https://openalex.org/W754765780","https://openalex.org/W1456054722","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1517505812","https://openalex.org/W1520227725","https://openalex.org/W1584434231","https://openalex.org/W1589586740","https://openalex.org/W1834967612","https://openalex.org/W2060562832","https://openalex.org/W2076046175","https://openalex.org/W2084149425","https://openalex.org/W2096113448","https://openalex.org/W2108072891","https://openalex.org/W2135654420","https://openalex.org/W2138001464","https://openalex.org/W2164090669","https://openalex.org/W2403036368","https://openalex.org/W2404947441","https://openalex.org/W2467620307","https://openalex.org/W2500250645","https://openalex.org/W2520599105","https://openalex.org/W2531132285","https://openalex.org/W2539831671","https://openalex.org/W2598311158","https://openalex.org/W2739692995","https://openalex.org/W2899753821","https://openalex.org/W2950771012","https://openalex.org/W3109425694"],"related_works":["https://openalex.org/W930235707","https://openalex.org/W2811238529","https://openalex.org/W3143242943","https://openalex.org/W1579090196","https://openalex.org/W2113284756","https://openalex.org/W2392842253","https://openalex.org/W1638568530","https://openalex.org/W2099171290","https://openalex.org/W3176506582","https://openalex.org/W2087299051"],"abstract_inverted_index":{"Attribute-Based":[0,120,195],"Authenticated":[1],"Key":[2],"Exchange":[3],"(ABAKE)":[4],"protocols":[5,35],"allow":[6],"two":[7],"or":[8],"more":[9],"users":[10],"to":[11,99],"establish":[12],"a":[13,40,58,73,181,208],"shared":[14],"key":[15],"and":[16,53,91,129,166,200],"achieve":[17],"mutual":[18],"authentication":[19],"over":[20,29],"an":[21,119],"insecure":[22],"network,":[23],"while":[24],"providing":[25],"fine-grained":[26],"access":[27,49,112,158],"control":[28],"transmitted":[30],"data.":[31],"The":[32],"existing":[33],"ABAKE":[34,76,139,171,191],"are":[36],"very":[37],"inefficient,":[38],"requiring":[39],"large":[41],"number":[42,80,93,101,126,152],"(polynomial":[43],"in":[44,61,104,137,160,193,216],"the":[45,48,62,79,92,100,105,110,133,144,161,187,194,205,211,217],"size":[46],"of":[47,51,65,75,81,94,102,127,147,153,169,189,207,210],"policies)":[50],"pairing":[52,82],"exponentiation":[54,95],"operations.":[55],"This":[56,141],"presents":[57],"major":[59],"hindrance":[60],"real-world":[63],"deployment":[64],"these":[66],"protocols.":[67],"In":[68],"this":[69,115],"work,":[70],"we":[71,117],"present":[72],"construction":[74,146,172,192],"protocol":[77],"where":[78],"operations":[83,96],"is":[84,97,173,176,180],"constant":[85,125,151],"(to":[86],"be":[87],"precise":[88],"only":[89],"7)":[90],"linear":[98],"clauses":[103],"disjunctive":[106],"normal":[107],"form":[108],"representing":[109],"general":[111,156],"policies.":[113],"To":[114],"end,":[116],"construct":[118],"Signcryption":[121],"(ABSC)":[122],"scheme":[123],"with":[124,150],"pairings,":[128],"use":[130],"it":[131,175,179],"as":[132],"main":[134],"building":[135],"block":[136],"our":[138,170,190],"construction.":[140],"also":[142],"gives":[143],"first":[145],"ABSC":[148],"schemes":[149],"pairings":[154],"for":[155],"purpose":[157],"policies":[159],"standard":[162],"model.":[163,220],"Another":[164],"important":[165],"desirable":[167],"feature":[168],"that":[174],"round-optimal,":[177],"i.e.":[178],"single":[182],"round":[183],"protocol.":[184],"We":[185],"analyse":[186],"security":[188,203],"extended":[196],"Canetti-Krawzyck":[197],"(ABeCK)":[198],"model,":[199],"prove":[201],"its":[202],"assuming":[204],"hardness":[206],"variant":[209],"Bilinear":[212],"Diffie-Hellman":[213],"Exponent":[214],"problem":[215],"random":[218],"oracle":[219]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
