{"id":"https://openalex.org/W4293499144","doi":"https://doi.org/10.1109/access.2022.3202966","title":"Toward Round-Efficient Verifiable Re-Encryption Mix-Net","display_name":"Toward Round-Efficient Verifiable Re-Encryption Mix-Net","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4293499144","doi":"https://doi.org/10.1109/access.2022.3202966"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3202966","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3202966","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09869819.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09869819.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100638898","display_name":"Myungsun Kim","orcid":"https://orcid.org/0000-0002-0461-3053"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Myungsun Kim","raw_affiliation_strings":["Department of Mathematics, Gachon University, Seongnam, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-0461-3053","affiliations":[{"raw_affiliation_string":"Department of Mathematics, Gachon University, Seongnam, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100638898"],"corresponding_institution_ids":["https://openalex.org/I12832649"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.5549,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72175965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"10","issue":null,"first_page":"91397","last_page":"91413"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7491646409034729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6977046728134155},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6875673532485962},{"id":"https://openalex.org/keywords/net","display_name":"Net (polyhedron)","score":0.5169843435287476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4667283296585083},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44571590423583984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35416561365127563},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14574792981147766},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11610642075538635}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7491646409034729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6977046728134155},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6875673532485962},{"id":"https://openalex.org/C14166107","wikidata":"https://www.wikidata.org/wiki/Q253829","display_name":"Net (polyhedron)","level":2,"score":0.5169843435287476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4667283296585083},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44571590423583984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35416561365127563},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14574792981147766},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11610642075538635},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3202966","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3202966","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09869819.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:971efba02f43484aa1b197c20b67fb4a","is_oa":true,"landing_page_url":"https://doaj.org/article/971efba02f43484aa1b197c20b67fb4a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 91397-91413 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3202966","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3202966","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09869819.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[{"id":"https://openalex.org/G19064504","display_name":null,"funder_award_id":"NRF-2022R1F1A1062806","funder_id":"https://openalex.org/F4320311687","funder_display_name":"Ministry of Education"},{"id":"https://openalex.org/G2523609225","display_name":null,"funder_award_id":"NRF-2017R1D1A1B04035209","funder_id":"https://openalex.org/F4320311687","funder_display_name":"Ministry of Education"}],"funders":[{"id":"https://openalex.org/F4320311687","display_name":"Ministry of Education","ror":"https://ror.org/03m01yf64"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4293499144.pdf","grobid_xml":"https://content.openalex.org/works/W4293499144.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W111294696","https://openalex.org/W233279079","https://openalex.org/W1486640683","https://openalex.org/W1497828701","https://openalex.org/W1498994266","https://openalex.org/W1499934958","https://openalex.org/W1502745717","https://openalex.org/W1512598008","https://openalex.org/W1522597308","https://openalex.org/W1531195150","https://openalex.org/W1532874975","https://openalex.org/W1534388293","https://openalex.org/W1586972594","https://openalex.org/W1589034595","https://openalex.org/W1600010237","https://openalex.org/W1606058619","https://openalex.org/W1606570149","https://openalex.org/W1666126665","https://openalex.org/W1850322980","https://openalex.org/W1878594160","https://openalex.org/W1997859100","https://openalex.org/W2039605106","https://openalex.org/W2061867775","https://openalex.org/W2090903439","https://openalex.org/W2095708839","https://openalex.org/W2101770573","https://openalex.org/W2102632861","https://openalex.org/W2103647628","https://openalex.org/W2106583429","https://openalex.org/W2113085788","https://openalex.org/W2120506990","https://openalex.org/W2129184440","https://openalex.org/W2132172731","https://openalex.org/W2133389457","https://openalex.org/W2141420453","https://openalex.org/W2150248082","https://openalex.org/W2153193245","https://openalex.org/W2153783737","https://openalex.org/W2167485997","https://openalex.org/W2170561193","https://openalex.org/W2233233025","https://openalex.org/W2293852648","https://openalex.org/W2398294729","https://openalex.org/W2401242379","https://openalex.org/W2768583136","https://openalex.org/W2794717746","https://openalex.org/W2911825405","https://openalex.org/W2970097841","https://openalex.org/W3022001663","https://openalex.org/W3047544424","https://openalex.org/W3091638055","https://openalex.org/W3092032168","https://openalex.org/W3151046115","https://openalex.org/W3209666863","https://openalex.org/W4210300416","https://openalex.org/W4250314891","https://openalex.org/W4283726258","https://openalex.org/W6629643366"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2139109546","https://openalex.org/W2128900334"],"abstract_inverted_index":{"Re-encryption":[0],"mix-nets":[1],"(RMNs)":[2],"provide":[3,220],"an":[4,119,131],"efficient,":[5],"cryptographic,":[6],"anonymous":[7],"channel":[8],"for":[9,126],"useful":[10],"applications,":[11],"such":[12],"as":[13],"e-voting":[14,60,127],"and":[15,43,93,153,185,198,233],"web":[16],"browsing.":[17],"Many":[18],"studies":[19],"have":[20],"been":[21,33],"devoted":[22],"to":[23,35,41,106,165,209],"achieving":[24],"practically":[25],"efficient":[26],"RMN":[27,71,81,134,146,162,188,215],"protocols,":[28,51],"but":[29],"less":[30],"attention":[31],"has":[32],"paid":[34],"addressing":[36],"their":[37],"round":[38,234],"efficiency":[39],"than":[40,212],"computation":[42],"communication":[44],"measures.":[45],"However,":[46],"in":[47,83,135,228],"many":[48],"interactive":[49],"cryptographic":[50],"network":[52],"latency":[53],"governs":[54],"the":[55,66,99,103,115,136,150,159,194,213],"overall":[56],"execution":[57],"time.":[58],"Because":[59],"systems":[61],"are":[62],"particularly":[63],"interaction":[64],"intensive,":[65],"design":[67],"of":[68,74,89,96,102,111,174,193,196,225,230],"a":[69,79,84,109,144,166,172,221],"round-efficient":[70],"protocol":[72,82,147,189,206,227],"is":[73,105,123],"particular":[75],"interest.":[76],"We":[77,129,141],"propose":[78],"constant-round":[80,145],"three-party":[85,121,133,161],"model":[86,122],"that":[87,155,169,204],"consists":[88],"senders,":[90],"mix":[91,175,199],"servers":[92],"some":[94],"number":[95],"receivers.":[97],"Here,":[98],"main":[100],"role":[101],"receivers":[104,178],"jointly":[107],"decrypt":[108],"list":[110],"ciphertexts":[112],"obtained":[113],"from":[114],"mixing":[116],"stage.":[117],"Such":[118],"explicit":[120],"most":[124],"suitable":[125],"applications.":[128],"define":[130],"ideal":[132,160],"universally":[137],"composable":[138],"(UC)":[139],"framework.":[140],"then":[142],"present":[143],"based":[148],"on":[149],"standard":[151],"assumptions":[152],"prove":[154],"it":[156],"UC":[157],"realizes":[158],"with":[163,181],"respect":[164],"static":[167],"adversary":[168],"can":[170],"corrupt":[171],"minority":[173],"servers,":[176],"disallowing":[177],"who":[179],"collude":[180],"other":[182],"players.We":[183],"implement":[184],"evaluate":[186],"our":[187,205,226],"over":[190],"various":[191],"ranges":[192],"numbers":[195],"senders":[197],"servers.":[200],"Our":[201],"evaluation":[202],"shows":[203],"runs":[207],"up":[208],"2.5&#x00D7;":[210],"faster":[211],"Universal":[214],"protocol.":[216],"In":[217],"addition,":[218],"we":[219],"detailed":[222],"theoretical":[223],"analysis":[224],"terms":[229],"computation,":[231],"transmission,":[232],"efficiency.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-08-29T00:00:00"}
