{"id":"https://openalex.org/W2774035703","doi":"https://doi.org/10.1093/comjnl/bxx111","title":"Novel Smooth Hash Proof Systems Based on Lattices","display_name":"Novel Smooth Hash Proof Systems Based on Lattices","publication_year":2017,"publication_date":"2017-12-06","ids":{"openalex":"https://openalex.org/W2774035703","doi":"https://doi.org/10.1093/comjnl/bxx111","mag":"2774035703"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxx111","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx111","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025625569","display_name":"Qiqi Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Lai","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000988425","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0002-0419-1209"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Yang","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074838647","display_name":"Chen Yuan","orcid":"https://orcid.org/0000-0002-3730-8397"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, PR China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, PR China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016091607","display_name":"Jian Bai","orcid":"https://orcid.org/0000-0002-9845-6991"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jian Bai","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000988425"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I88830068"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.9751,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82748216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"61","issue":"4","first_page":"561","last_page":"574"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8456375598907471},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6424464583396912},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5493313670158386},{"id":"https://openalex.org/keywords/swifft","display_name":"SWIFFT","score":0.5343272686004639},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.485795259475708},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.47137650847435},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.43974193930625916},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.42527931928634644},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42068326473236084},{"id":"https://openalex.org/keywords/perfect-hash-function","display_name":"Perfect hash function","score":0.4100217819213867},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2848164439201355},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.26474612951278687},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.07209673523902893}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8456375598907471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6424464583396912},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5493313670158386},{"id":"https://openalex.org/C133358856","wikidata":"https://www.wikidata.org/wiki/Q7395188","display_name":"SWIFFT","level":5,"score":0.5343272686004639},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.485795259475708},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.47137650847435},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.43974193930625916},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.42527931928634644},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42068326473236084},{"id":"https://openalex.org/C87431388","wikidata":"https://www.wikidata.org/wiki/Q2070573","display_name":"Perfect hash function","level":4,"score":0.4100217819213867},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2848164439201355},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.26474612951278687},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.07209673523902893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxx111","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx111","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1943021534","https://openalex.org/W1994790157","https://openalex.org/W2007466965","https://openalex.org/W2130410178","https://openalex.org/W2154911744","https://openalex.org/W2181114408","https://openalex.org/W2331248027","https://openalex.org/W2525722349","https://openalex.org/W6727799509"],"related_works":["https://openalex.org/W1972792640","https://openalex.org/W2227130482","https://openalex.org/W2342330140","https://openalex.org/W1589892159","https://openalex.org/W4387590977","https://openalex.org/W1773180899","https://openalex.org/W2774174285","https://openalex.org/W1816863519","https://openalex.org/W2258873926","https://openalex.org/W2119251656"],"abstract_inverted_index":{"As":[0],"a":[1,46,134],"basic":[2],"and":[3,17,104,118,142],"important":[4],"primitive,":[5],"hash":[6,27,37,50,66,130],"proof":[7,28,38,51,67,131],"system":[8],"can":[9,110],"be":[10,111,115],"used":[11],"to":[12,23,114,128,140,153],"construct":[13],"many":[14,36],"cryptographic":[15],"schemes":[16],"protocols.":[18],"Therefore,":[19],"it":[20],"is":[21,79,127],"significant":[22],"instantiate":[24],"more":[25,105],"efficient":[26,49],"systems":[29,39,52,68,132],"from":[30],"various":[31,42],"assumptions.":[32,58],"Although":[33],"there":[34],"are":[35,53,100],"based":[40,55,69,94],"on":[41,56,70,95,133],"classical":[43],"assumptions,":[44],"only":[45],"handful":[47],"of":[48,146,149],"known":[54],"post-quantum":[57],"In":[59],"this":[60],"paper,":[61,123],"we":[62],"present":[63],"several":[64],"new":[65,135],"the":[71,122,144],"standard":[72,85],"learning":[73],"with":[74,90],"errors":[75],"(LWE)":[76],"problem,":[77],"which":[78],"at":[80],"least":[81],"as":[82,84],"hard":[83],"worst-case":[86],"lattice":[87],"problems.":[88],"Comparing":[89],"other":[91],"existing":[92],"constructions":[93,109],"lattices,":[96],"our":[97,108,124],"main":[98,125],"advantages":[99],"2-fold:":[101],"much":[102],"simpler":[103],"efficient.":[106],"And":[107],"easily":[112],"extended":[113],"identity-based":[116],"ones":[117],"updatable":[119],"ones.":[120],"Throughout":[121],"idea":[126],"base":[129],"subset":[136],"indistinguishability":[137],"problem":[138],"related":[139],"LWE,":[141],"employ":[143],"property":[145],"smooth":[147],"parameter":[148],"q-ary":[150],"orthogonal":[151],"lattices":[152],"ensure":[154],"smoothness.":[155]},"counts_by_year":[{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
