{"id":"https://openalex.org/W2741103382","doi":"https://doi.org/10.1109/smc.2017.8123025","title":"Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?","display_name":"Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2741103382","doi":"https://doi.org/10.1109/smc.2017.8123025","mag":"2741103382"},"language":"en","primary_location":{"id":"doi:10.1109/smc.2017.8123025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1707.09078","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jaouhar Fattahi","orcid":null},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jaouhar Fattahi","raw_affiliation_strings":["Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohamed Mejri","orcid":null},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohamed Mejri","raw_affiliation_strings":["Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Marwa Ziadia","orcid":null},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Marwa Ziadia","raw_affiliation_strings":["Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Universit\u00e9 Laval, Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Takwa Omrani","orcid":null},"institutions":[{"id":"https://openalex.org/I68916915","display_name":"University of Gab\u00e8s","ror":"https://ror.org/022efad20","country_code":"TN","type":"education","lineage":["https://openalex.org/I68916915"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Takwa Omrani","raw_affiliation_strings":["Computer Science and Software Engineering Department, University of Gab\u00e8s, Tunisia"],"affiliations":[{"raw_affiliation_string":"Computer Science and Software Engineering Department, University of Gab\u00e8s, Tunisia","institution_ids":["https://openalex.org/I68916915"]}]},{"author_position":"last","author":{"id":null,"display_name":"Emil Pricop","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090220","display_name":"Petroleum & Gas University of Ploie\u015fti","ror":"https://ror.org/00abdnc40","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210090220"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Emil Pricop","raw_affiliation_strings":["Automatic Control, Computers and Electronics Department, Petroleum-Gas University of Ploiesti, Romania"],"affiliations":[{"raw_affiliation_string":"Automatic Control, Computers and Electronics Department, Petroleum-Gas University of Ploiesti, Romania","institution_ids":["https://openalex.org/I4210090220"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I43406934"],"apc_list":null,"apc_paid":null,"fwci":0.4374,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67329751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"2649","last_page":"2654"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8621000051498413},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7523000240325928},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6942999958992004},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6718999743461609},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5353000164031982},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4961000084877014}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8621000051498413},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7523000240325928},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6942999958992004},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6718999743461609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6367999911308289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5547999739646912},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5353000164031982},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4961000084877014},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.42160001397132874},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3718000054359436},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.3319999873638153},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2736999988555908},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2662999927997589}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/smc.2017.8123025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1707.09078","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1707.09078","pdf_url":"https://arxiv.org/pdf/1707.09078","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1707.09078","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1707.09078","pdf_url":"https://arxiv.org/pdf/1707.09078","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1515715680","https://openalex.org/W1897128362","https://openalex.org/W1933998117","https://openalex.org/W2029693536","https://openalex.org/W2036714652","https://openalex.org/W2144444499","https://openalex.org/W2155993098","https://openalex.org/W2171115116","https://openalex.org/W2249378124","https://openalex.org/W2463913081","https://openalex.org/W2587436767","https://openalex.org/W2587628505","https://openalex.org/W6605695596","https://openalex.org/W6608146295","https://openalex.org/W6712432342","https://openalex.org/W6748088010"],"related_works":[],"abstract_inverted_index":{"Proving":[0],"that":[1,25,31,84],"a":[2,10,94],"cryptographic":[3],"protocol":[4,100],"is":[5,9,22,27,67,74],"correct":[6],"for":[7,110],"secrecy":[8,111],"hard":[11],"task.":[12],"One":[13],"of":[14,35,51,61,70,77,97],"the":[15,32,42,58,68,75,85,103,113],"strongest":[16],"strategies":[17],"to":[18,23,56,116],"reach":[19],"this":[20,80],"goal":[21],"show":[24,83],"it":[26],"increasing,":[28],"which":[29,102],"means":[30],"security":[33,59],"level":[34,60],"every":[36],"single":[37],"atomic":[38,62],"message":[39],"exchanged":[40],"in":[41,106],"protocol,":[43],"safely":[44],"evaluated,":[45],"never":[46],"deceases.":[47],"Recently,":[48],"two":[49],"families":[50],"functions":[52],"have":[53],"been":[54],"proposed":[55],"measure":[57],"messages.":[63],"The":[64,72],"first":[65],"one":[66],"family":[69,76],"interpretation-functions.":[71,91],"second":[73],"witness-functions.":[78],"In":[79],"paper,":[81],"we":[82],"witness-functions":[86,104],"are":[87],"more":[88],"efficient":[89],"than":[90],"We":[92],"give":[93],"detailed":[95],"analysis":[96],"an":[98],"ad-hoc":[99],"on":[101],"succeed":[105],"proving":[107],"its":[108],"correctness":[109],"while":[112],"interpretation-functions":[114],"fail":[115],"do":[117],"so.":[118]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2017-08-08T00:00:00"}
