{"id":"https://openalex.org/W2038033281","doi":"https://doi.org/10.1108/20439371211273285","title":"Public\u2010key coding system based on grey generation and braid group","display_name":"Public\u2010key coding system based on grey generation and braid group","publication_year":2012,"publication_date":"2012-10-22","ids":{"openalex":"https://openalex.org/W2038033281","doi":"https://doi.org/10.1108/20439371211273285","mag":"2038033281"},"language":"en","primary_location":{"id":"doi:10.1108/20439371211273285","is_oa":false,"landing_page_url":"https://doi.org/10.1108/20439371211273285","pdf_url":null,"source":{"id":"https://openalex.org/S4210188239","display_name":"Grey Systems Theory and Application","issn_l":"2043-9377","issn":["2043-9377","2043-9385"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Grey Systems: Theory and Application","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101541192","display_name":"Shouwei Li","orcid":"https://orcid.org/0000-0003-1534-1628"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Shouwei","raw_affiliation_strings":["Jiangsu University, Zhenjiang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Jiangsu University, Zhenjiang, People's Republic of China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mei Qiang","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mei Qiang","raw_affiliation_strings":["Jiangsu University, Zhenjiang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Jiangsu University, Zhenjiang, People's Republic of China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101541192"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11326794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"3","first_page":"419","last_page":"426"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6633850932121277},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6150747537612915},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5922594666481018},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.55323326587677},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4937487542629242},{"id":"https://openalex.org/keywords/braid-group","display_name":"Braid group","score":0.4594830274581909},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45528659224510193},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4324856102466583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4246734082698822},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3690730035305023},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2564639449119568},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21382474899291992}],"concepts":[{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6633850932121277},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6150747537612915},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5922594666481018},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.55323326587677},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4937487542629242},{"id":"https://openalex.org/C33840335","wikidata":"https://www.wikidata.org/wiki/Q220409","display_name":"Braid group","level":2,"score":0.4594830274581909},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45528659224510193},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4324856102466583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4246734082698822},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3690730035305023},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2564639449119568},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21382474899291992},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/20439371211273285","is_oa":false,"landing_page_url":"https://doi.org/10.1108/20439371211273285","pdf_url":null,"source":{"id":"https://openalex.org/S4210188239","display_name":"Grey Systems Theory and Application","issn_l":"2043-9377","issn":["2043-9377","2043-9385"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Grey Systems: Theory and Application","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1510717485","https://openalex.org/W1577818368","https://openalex.org/W2013377700","https://openalex.org/W2038822678","https://openalex.org/W2141795642","https://openalex.org/W2377579792","https://openalex.org/W2383911158","https://openalex.org/W2384753722","https://openalex.org/W6634609459"],"related_works":["https://openalex.org/W2550059757","https://openalex.org/W1980134735","https://openalex.org/W2350695503","https://openalex.org/W2888183313","https://openalex.org/W3009555975","https://openalex.org/W3104614935","https://openalex.org/W2358235859","https://openalex.org/W2123811836","https://openalex.org/W783558444","https://openalex.org/W2096713635"],"abstract_inverted_index":{"Purpose":[0],"This":[1],"paper":[2,94,148,203,224],"attempts":[3],"to":[4,164],"construct":[5],"a":[6,113,208],"public\u2010key":[7],"coding":[8],"system":[9,116,139,200],"using":[10,71,118,238],"grey":[11,56,104,239],"generation":[12,106,231],"and":[13,30,107,137,167,197,232,242],"braid":[14,77,108,177,243],"group.":[15,109],"Design/methodology/approach":[16],"The":[17,93,131,190,223],"identification":[18],"(ID)":[19],"codes":[20],"of":[21,40,43,49,75,83,91,99,126,134,140,151,155,184,193,235],"both":[22,41,228],"sides":[23,42,90],"for":[24,28],"communication":[25,50,115,142,199,217,236],"are":[26,144],"public":[27,33],"everyone":[29],"considered":[31],"as":[32],"keys.":[34],"Starting":[35],"from":[36,161],"the":[37,45,55,61,72,76,80,84,123,138,152,168,182,185,194,220],"ID":[38,165],"code":[39,163,166],"communication,":[44],"temporary":[46,85],"secret":[47,65,86,100,127,135,229],"key":[48,66,87,101,128,136,230],"can":[51,67,180,204,212],"be":[52,68,205,213],"obtained":[53,69],"by":[54,70,117,237],"1\u2010AGO":[57],"algorithm":[58,186],"first.":[59],"Then":[60],"new":[62],"formal":[63],"common":[64],"element":[73],"exchangeability":[74],"group":[78,244],"during":[79],"exchanging":[81,233],"process":[82],"between":[88],"two":[89],"communication.":[92],"presents":[95],"an":[96],"exchange":[97,124,132,195],"protocol":[98,125,133,196,234],"based":[102,121],"on":[103,122,219],"data":[105],"It":[110],"also":[111],"constructs":[112],"cipher":[114,141,198],"Hash":[119],"function":[120],"last.":[129],"Findings":[130],"which":[143,171,179],"proposed":[145],"in":[146,176,201,215,226],"this":[147,202],"make":[149],"use":[150],"difficult":[153],"problem":[154,170],"resolving":[156],"dis":[157],"per":[158],"se":[159],"logarithm":[160],"generated":[162],"conjugate":[169],"is":[172],"not":[173],"ever":[174],"resolved":[175],"group,":[178],"ensure":[181],"security":[183],"theoretically.":[187],"Practical":[188],"implications":[189],"main":[191],"steps":[192],"achieved":[206],"through":[207],"computer":[209],"program.":[210],"They":[211],"used":[214],"many":[216],"processes":[218],"internet.":[221],"Originality/value":[222],"succeeds":[225],"realising":[227],"systems":[240],"theory":[241],"properties.":[245]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
