{"id":"https://openalex.org/W4206714243","doi":"https://doi.org/10.1109/ipccc51483.2021.9679452","title":"SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX","display_name":"SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX","publication_year":2021,"publication_date":"2021-10-29","ids":{"openalex":"https://openalex.org/W4206714243","doi":"https://doi.org/10.1109/ipccc51483.2021.9679452"},"language":"en","primary_location":{"id":"doi:10.1109/ipccc51483.2021.9679452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc51483.2021.9679452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007902857","display_name":"Wenyi Ouyang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenyi Ouyang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","Data Assurance and Communications Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"Data Assurance and Communications Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011886723","display_name":"Qiongxiao Wang","orcid":"https://orcid.org/0000-0002-8012-8295"},"institutions":[{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiongxiao Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392305","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-4457-6709"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075421344","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-2639-3722"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["University of Science and Technology of China,Beijing Research Institute,Beijing,China","Beijing Research Institute, University of Science and Technology of China, Beijing, China","School of Cyber Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Beijing Research Institute,Beijing,China","institution_ids":["https://openalex.org/I92403157","https://openalex.org/I126520041"]},{"raw_affiliation_string":"Beijing Research Institute, University of Science and Technology of China, Beijing, China","institution_ids":["https://openalex.org/I92403157","https://openalex.org/I126520041"]},{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088464769","display_name":"Yaxi He","orcid":null},"institutions":[{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaxi He","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007902857"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4391768012"],"apc_list":null,"apc_paid":null,"fwci":0.6798,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7667941,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8008578419685364},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004698753356934},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.6619260311126709},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6536020636558533},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6000688672065735},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5861907005310059},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.51994788646698},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5026054382324219},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4624841809272766},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.44294002652168274},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4305833578109741},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4186117351055145},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4144389033317566},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3386628031730652},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23943963646888733},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19058802723884583},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10978639125823975}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8008578419685364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004698753356934},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.6619260311126709},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6536020636558533},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6000688672065735},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5861907005310059},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.51994788646698},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5026054382324219},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4624841809272766},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.44294002652168274},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4305833578109741},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4186117351055145},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4144389033317566},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3386628031730652},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23943963646888733},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19058802723884583},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10978639125823975}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc51483.2021.9679452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc51483.2021.9679452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2036329595","https://openalex.org/W2129483619","https://openalex.org/W2270478131","https://openalex.org/W2564798724","https://openalex.org/W2759293838","https://openalex.org/W2765706244","https://openalex.org/W2793588429","https://openalex.org/W2801607058","https://openalex.org/W2807403537","https://openalex.org/W2886430483","https://openalex.org/W2886636392","https://openalex.org/W2888798936","https://openalex.org/W2889762527","https://openalex.org/W2898548365","https://openalex.org/W2901644588","https://openalex.org/W2907212274","https://openalex.org/W2909941289","https://openalex.org/W2954369705","https://openalex.org/W3012124848","https://openalex.org/W3015806656","https://openalex.org/W3015844221","https://openalex.org/W3100860658","https://openalex.org/W3103451427","https://openalex.org/W3104317828","https://openalex.org/W6754227972","https://openalex.org/W6966745694"],"related_works":["https://openalex.org/W2775943201","https://openalex.org/W2120129724","https://openalex.org/W2561804856","https://openalex.org/W2407700239","https://openalex.org/W2910586303","https://openalex.org/W1881831204","https://openalex.org/W2949316140","https://openalex.org/W2951404390","https://openalex.org/W4387561382","https://openalex.org/W258860244"],"abstract_inverted_index":{"The":[0,117,163],"wide":[1],"spread":[2],"of":[3,10,49,71,84,101,120,136,173],"cloud":[4],"computing":[5,51,174],"and":[6,28,87,112,159,169],"the":[7,14,46,56,68,109,113],"rapid":[8],"growth":[9],"online":[11],"activities":[12],"raise":[13],"demand":[15],"for":[16,105],"privacy":[17,42],"enhancing":[18,43],"cryptography,":[19],"such":[20,72],"as":[21],"identity-based":[22],"encryption":[23,26],"(IBE),":[24],"attribute-based":[25],"(ABE),":[27],"group/ring":[29],"signature,":[30,161],"which":[31,64],"are":[32,61,103,167],"mostly":[33],"asymmetric.":[34],"However,":[35],"implementing":[36,142],"a":[37,82],"practical":[38],"asymmetric":[39,89,121,144,155,183],"cryptosystem":[40,184],"with":[41,108,146],"functionalities":[44],"faces":[45],"big":[47],"challenge":[48],"large":[50],"overhead":[52],"that":[53,139,179],"stems":[54],"from":[55],"hard":[57],"mathematical":[58],"problems":[59],"they":[60],"based":[62,128],"on,":[63],"in":[65,126,171,186],"reality":[66],"hinders":[67],"further":[69],"deployment":[70],"cryptosystems.In":[73],"this":[74],"paper,":[75],"we":[76],"propose":[77],"\"SGX":[78],"Cipher":[79],"Box\"":[80],"(SCB),":[81],"method":[83],"constructing":[85],"flexible":[86],"efficient":[88],"computations":[90,107,145],"by":[91,132],"encapsulating":[92],"symmetric":[93],"algorithms":[94,122],"into":[95],"Intel":[96],"SGX":[97],"enclaves.":[98,148],"Two":[99],"types":[100],"enclaves":[102],"designed":[104],"serving":[106],"public":[110],"key":[111],"private":[114],"key,":[115],"respectively.":[116,162],"security":[118],"assumptions":[119],"can":[123],"be":[124],"achieved":[125],"SCB":[127,134,180],"on":[129],"guarantees":[130],"offered":[131],"SGX.":[133],"is":[135],"great":[137],"flexibility":[138],"it":[140],"facilitates":[141],"various":[143],"limited":[147],"We":[149],"present":[150],"four":[151,164],"SCB-based":[152],"cryptosystems,":[153],"provisioning":[154],"primitives,":[156],"IBE,":[157],"ABE,":[158],"ring":[160],"prototype":[165],"cryptosystems":[166],"implemented":[168],"benchmarked":[170],"terms":[172],"efficiency.":[175],"Experimental":[176],"results":[177],"show":[178],"surpasses":[181],"conventional":[182],"implementations":[185],"performance.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
