{"id":"https://openalex.org/W3185554221","doi":"https://doi.org/10.1109/tsc.2021.3100323","title":"Smooth Projective Hash Function From Codes and its Applications","display_name":"Smooth Projective Hash Function From Codes and its Applications","publication_year":2021,"publication_date":"2021-07-27","ids":{"openalex":"https://openalex.org/W3185554221","doi":"https://doi.org/10.1109/tsc.2021.3100323","mag":"3185554221"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2021.3100323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2021.3100323","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032082083","display_name":"Masoumeh Koochak Shooshtari","orcid":"https://orcid.org/0000-0003-4879-8640"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Masoumeh Koochak Shooshtari","raw_affiliation_strings":["Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028840314","display_name":"Mohammad Reza Aref","orcid":"https://orcid.org/0000-0002-4321-0345"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Aref","raw_affiliation_strings":["Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032082083"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62533849,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"15","issue":"6","first_page":"3541","last_page":"3553"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7877748012542725},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.626064121723175},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6255542635917664},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.5626921057701111},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5385900735855103},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.52279132604599},{"id":"https://openalex.org/keywords/bb84","display_name":"BB84","score":0.46716630458831787},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.41057974100112915},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.3864513635635376},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.30005213618278503},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.26992207765579224},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26912522315979004},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26483285427093506},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22438079118728638},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.17714205384254456}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7877748012542725},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.626064121723175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6255542635917664},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.5626921057701111},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5385900735855103},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.52279132604599},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.46716630458831787},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.41057974100112915},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.3864513635635376},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30005213618278503},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.26992207765579224},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26912522315979004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26483285427093506},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22438079118728638},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.17714205384254456},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2021.3100323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2021.3100323","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8505760306","display_name":null,"funder_award_id":"96/53979","funder_id":"https://openalex.org/F4320322243","funder_display_name":"Iran National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322243","display_name":"Iran National Science Foundation","ror":"https://ror.org/03sr1ma14"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W124221785","https://openalex.org/W152516429","https://openalex.org/W1479860068","https://openalex.org/W1493476231","https://openalex.org/W1510132879","https://openalex.org/W1513096110","https://openalex.org/W1516161674","https://openalex.org/W1518187966","https://openalex.org/W1534643746","https://openalex.org/W1536493828","https://openalex.org/W1547517307","https://openalex.org/W1590654318","https://openalex.org/W1595415026","https://openalex.org/W1759759811","https://openalex.org/W1942594900","https://openalex.org/W1947829872","https://openalex.org/W1961257075","https://openalex.org/W1979280691","https://openalex.org/W1994538893","https://openalex.org/W1998784354","https://openalex.org/W2068189841","https://openalex.org/W2071265330","https://openalex.org/W2096939478","https://openalex.org/W2110804296","https://openalex.org/W2133270269","https://openalex.org/W2134585266","https://openalex.org/W2137648527","https://openalex.org/W2148959297","https://openalex.org/W2163542231","https://openalex.org/W2165111290","https://openalex.org/W2186096729","https://openalex.org/W2545060317","https://openalex.org/W2591819627","https://openalex.org/W2592817464","https://openalex.org/W2769568011","https://openalex.org/W2789338552","https://openalex.org/W2794563709","https://openalex.org/W2977619799","https://openalex.org/W4390865640","https://openalex.org/W6628639592","https://openalex.org/W6632248230","https://openalex.org/W6635648346","https://openalex.org/W6749213967","https://openalex.org/W6750227578"],"related_works":["https://openalex.org/W1988941773","https://openalex.org/W2098078267","https://openalex.org/W2034912392","https://openalex.org/W4229004744","https://openalex.org/W2122945788","https://openalex.org/W1981044384","https://openalex.org/W2800452287","https://openalex.org/W1966252956","https://openalex.org/W2151161261","https://openalex.org/W2379299577"],"abstract_inverted_index":{"Nowadays,":[0],"Smooth":[1],"Projective":[2],"Hash":[3],"Functions":[4],"(SPHFs)":[5],"play":[6],"an":[7],"important":[8],"role":[9],"in":[10,23,33,73,121,181],"constructing":[11,39],"cryptographic":[12],"tools":[13],"such":[14,88],"as":[15,89],"secure":[16,98],"Password-based":[17],"Authenticated":[18],"Key":[19],"Exchange":[20],"(PAKE)":[21],"protocol":[22,49],"the":[24,115,168,182],"standard":[25,122,183],"model,":[26],"oblivious":[27],"transfer,":[28],"and":[29,92,131,175],"zero-knowledge":[30],"proofs.":[31],"Specifically,":[32],"this":[34,136],"article,":[35,137],"we":[36,138,151],"focus":[37],"on":[38,110,167],"PAKE":[40,119,156],"protocol;":[41],"that":[42,113],"is,":[43],"a":[44,53,59],"kind":[45],"of":[46,67,71,160,170],"key":[47],"exchange":[48],"which":[50],"needs":[51,132],"only":[52],"low":[54],"entropy":[55],"password":[56],"to":[57,82,95,117],"produce":[58],"cryptographically":[60],"strong":[61],"shared":[62],"session":[63],"key.":[64],"In":[65,135],"spite":[66],"relatively":[68],"good":[69],"progress":[70],"SPHFs":[72,116],"applications,":[74],"it":[75],"seems":[76],"there":[77,105],"has":[78],"been":[79],"little":[80],"effort":[81],"build":[83],"them":[84,97],"upon":[85],"quantum-resistant":[86,125],"assumptions":[87,112,126],"lattice-based":[90],"cryptography":[91,94],"code-based":[93],"make":[96],"against":[99],"quantum":[100],"computer":[101],"attacks.":[102],"More":[103],"precisely,":[104],"are":[106],"two":[107,140,154],"proposals":[108],"based":[109,166],"lattice":[111],"utilize":[114],"construct":[118,153],"secured":[120],"model.":[123,184],"Considering":[124],"is":[127],"less":[128],"than":[129],"straightforward":[130],"some":[133],"relaxations.":[134],"introduce":[139],"new":[141],"Approximate":[142],"SPHF":[143],"(ASPHFs)":[144],"from":[145],"error-correcting":[146],"codes.":[147],"Upon":[148],"designing":[149],"ASPHF,":[150],"can":[152],"efficient":[155],"protocols.":[157],"The":[158],"security":[159],"our":[161],"protocols":[162],"could":[163],"be":[164],"proved":[165],"hardness":[169],"bounded":[171],"decoding":[172],"(BD)":[173],"problem":[174,180],"learning":[176],"with":[177],"parity":[178],"(LPN)":[179]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
