{"id":"https://openalex.org/W4205727252","doi":"https://doi.org/10.1109/access.2022.3144725","title":"An Efficient Public-Key Dual-Receiver Encryption Scheme","display_name":"An Efficient Public-Key Dual-Receiver Encryption Scheme","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4205727252","doi":"https://doi.org/10.1109/access.2022.3144725"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3144725","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3144725","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09686748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09686748.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072561653","display_name":"Chenglong Gao","orcid":"https://orcid.org/0000-0001-6594-0114"},"institutions":[{"id":"https://openalex.org/I4210117493","display_name":"New Development Bank","ror":"https://ror.org/01rdcx205","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210117493"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenglong Gao","raw_affiliation_strings":["Shanghai Pudong Development Bank, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shanghai Pudong Development Bank, Shanghai, China","institution_ids":["https://openalex.org/I4210117493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101951847","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-0125-3988"},"institutions":[{"id":"https://openalex.org/I4210117493","display_name":"New Development Bank","ror":"https://ror.org/01rdcx205","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210117493"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["Shanghai Pudong Development Bank, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-0125-3988","affiliations":[{"raw_affiliation_string":"Shanghai Pudong Development Bank, Shanghai, China","institution_ids":["https://openalex.org/I4210117493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045443775","display_name":"Qiang Wang","orcid":"https://orcid.org/0000-0003-4629-8845"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Wang","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4629-8845","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101996267","display_name":"Zhixian Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhixian Chen","raw_affiliation_strings":["Zhejiang Gongshang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8560-3588","affiliations":[{"raw_affiliation_string":"Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072561653"],"corresponding_institution_ids":["https://openalex.org/I4210117493"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.5555,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70622042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"10","issue":null,"first_page":"10799","last_page":"10805"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7413946986198425},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6751112341880798},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6581547260284424},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6422039270401001},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6256818175315857},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5581927299499512},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5179428458213806},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4963293671607971},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4786418676376343},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.32023435831069946},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3148224949836731},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3128089904785156},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.06844678521156311}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7413946986198425},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6751112341880798},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6581547260284424},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6422039270401001},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6256818175315857},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5581927299499512},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5179428458213806},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4963293671607971},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4786418676376343},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.32023435831069946},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3148224949836731},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3128089904785156},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.06844678521156311},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3144725","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3144725","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09686748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a7c5a88c9d704d31851273b9741cdd6e","is_oa":true,"landing_page_url":"https://doaj.org/article/a7c5a88c9d704d31851273b9741cdd6e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 10799-10805 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3144725","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3144725","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09686748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4205727252.pdf","grobid_xml":"https://content.openalex.org/works/W4205727252.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1498307416","https://openalex.org/W1518817958","https://openalex.org/W1532836984","https://openalex.org/W1592092778","https://openalex.org/W2026572400","https://openalex.org/W2097638666","https://openalex.org/W2110326321","https://openalex.org/W2116556172","https://openalex.org/W2139910984","https://openalex.org/W2149305608","https://openalex.org/W2587998526","https://openalex.org/W2807730698","https://openalex.org/W2953143189","https://openalex.org/W3003950745","https://openalex.org/W3030316404","https://openalex.org/W3139100461","https://openalex.org/W3215464656","https://openalex.org/W6763881996"],"related_works":["https://openalex.org/W2883387842","https://openalex.org/W2483623434","https://openalex.org/W158703891","https://openalex.org/W3204260572","https://openalex.org/W4224885312","https://openalex.org/W4283588348","https://openalex.org/W3167877689","https://openalex.org/W2529476372","https://openalex.org/W3021199033","https://openalex.org/W2177671734"],"abstract_inverted_index":{"Public-key":[0],"dual-receiver":[1,28],"encryption":[2,10],"(PK-DRE)":[3],"is":[4,31,74,106],"a":[5,70,77],"kind":[6],"of":[7,100,116],"particular":[8],"public-key":[9],"for":[11],"enabling":[12],"two":[13],"independent":[14],"recipients":[15],"to":[16,26,84],"obtain":[17],"the":[18,22,54,98,103,110],"same":[19,23],"plaintext":[20],"from":[21,76],"ciphertext.":[24],"Due":[25],"its":[27],"property,":[29],"PK-DRE":[30,55,112],"quite":[32],"helpful":[33],"in":[34,88,114],"many":[35],"scenarios,":[36],"such":[37],"as":[38],"deniable":[39],"authentication,":[40],"global":[41],"key":[42,120],"escrow,":[43],"security":[44,79],"puzzle,":[45],"and":[46,68,119],"even":[47],"blockchain.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52],"revisit":[53],"scheme":[56],"<inline-formula":[57,89],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[58,90],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[59,91],"<tex-math":[60,92],"notation=\"LaTeX\">$\\mathtt":[61,93],"{CFZ}14$":[62,94],"</tex-math></inline-formula>":[63,95],"proposed":[64],"at":[65],"CT-RSA":[66],"2014":[67],"propose":[69],"variant.":[71],"This":[72],"variant":[73,105],"original":[75],"new":[78],"proof":[80],"which":[81],"allows":[82],"us":[83],"remove":[85],"some":[86],"steps":[87],".":[96],"To":[97],"best":[99],"our":[101],"knowledge,":[102],"obtained":[104],"more":[107],"efficient":[108],"than":[109],"existing":[111],"schemes":[113],"terms":[115],"public":[117],"verifiability":[118],"size.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
