{"id":"https://openalex.org/W2954812164","doi":"https://doi.org/10.1142/s0129054119400100","title":"Provably Secure (Broadcast) Homomorphic Signcryption","display_name":"Provably Secure (Broadcast) Homomorphic Signcryption","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2954812164","doi":"https://doi.org/10.1142/s0129054119400100","mag":"2954812164"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054119400100","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054119400100","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020136354","display_name":"Fatemeh Rezaeibagha","orcid":"https://orcid.org/0000-0002-1368-016X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Fatemeh Rezaeibagha","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, P. R. China","Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, P. R. China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100449695","display_name":"Shiwei Zhang","orcid":"https://orcid.org/0000-0002-0357-7185"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shiwei Zhang","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101738239","display_name":"Xiaofen Wang","orcid":"https://orcid.org/0000-0002-6744-4752"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofen Wang","raw_affiliation_strings":["Center for Cyber Security, Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, P. R. China"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020136354"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":1.0102,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82650246,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"30","issue":"04","first_page":"511","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9949007630348206},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9217483997344971},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.780087947845459},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6844103336334229},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44756758213043213},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.442893922328949},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4297906756401062},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3858986496925354},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32126450538635254},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.300187349319458},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2638787031173706},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20352426171302795},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18598589301109314}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9949007630348206},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9217483997344971},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.780087947845459},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6844103336334229},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44756758213043213},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.442893922328949},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4297906756401062},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3858986496925354},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32126450538635254},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.300187349319458},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2638787031173706},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20352426171302795},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18598589301109314},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1142/s0129054119400100","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054119400100","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:54695","is_oa":false,"landing_page_url":"https://researchrepository.murdoch.edu.au/id/eprint/54695/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Rezaeibagha, F. &lt;https://researchrepository.murdoch.edu.au/view/author/Rezaeibagha, Fatemeh.html&gt;, Mu, Y., Zhang, S. and Wang, X.   (2019)  Provably Secure (Broadcast) Homomorphic Signcryption.    International Journal of Foundations of Computer Science, 30  (4).   pp. 511-529.  ","raw_type":"Journal Article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-4005","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/2987","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W405661327","https://openalex.org/W924029577","https://openalex.org/W1516634197","https://openalex.org/W1534388293","https://openalex.org/W1557023607","https://openalex.org/W1587823440","https://openalex.org/W1590263452","https://openalex.org/W1594668186","https://openalex.org/W1741292496","https://openalex.org/W1785500772","https://openalex.org/W1798609567","https://openalex.org/W1874619058","https://openalex.org/W1905774212","https://openalex.org/W1964524454","https://openalex.org/W2024471472","https://openalex.org/W2031533839","https://openalex.org/W2113717903","https://openalex.org/W2132172731","https://openalex.org/W2475136350","https://openalex.org/W2510312775","https://openalex.org/W2585855180","https://openalex.org/W2761652747","https://openalex.org/W2766497172","https://openalex.org/W2963491455","https://openalex.org/W4238634196"],"related_works":["https://openalex.org/W2766497172","https://openalex.org/W2954812164","https://openalex.org/W4388087842","https://openalex.org/W2015242147","https://openalex.org/W2551652499","https://openalex.org/W1891552123","https://openalex.org/W1810303253","https://openalex.org/W1499103434","https://openalex.org/W2915550258","https://openalex.org/W2662454373"],"abstract_inverted_index":{"Signcryption":[0],"has":[1],"drawn":[2],"a":[3,51,64,104],"lot":[4],"of":[5],"attention":[6],"due":[7],"to":[8,83,96],"its":[9],"useful":[10],"applications":[11,18],"in":[12,15,57,107],"many":[13],"areas,":[14],"particular":[16],"for":[17,27,29,59],"where":[19],"the":[20,39,60,77,91],"computation":[21],"and":[22],"communication":[23],"resources":[24],"are":[25],"constrained,":[26],"example,":[28],"lightweight":[30],"devices.":[31],"The":[32],"traditional":[33],"signcryption":[34,55,79,87],"scheme":[35,65],"does":[36],"not":[37],"support":[38],"homomorphic":[40,54,78],"property.":[41],"Recent":[42],"work":[43],"by":[44],"Rezaeibagha":[45],"et":[46],"al.":[47],"(Provsec":[48],"2017)":[49],"offered":[50],"provably":[52,66,84],"secure":[53,67,85],"scheme,":[56],"which":[58],"first":[61],"time,":[62],"provided":[63],"under":[68],"some":[69],"restriction.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74],"show":[75],"that":[76,102],"can":[80],"be":[81,97],"extended":[82],"broadcast":[86],"scheme.":[88],"We":[89],"allow":[90],"broadcasted":[92],"signcrypted":[93],"data":[94],"items":[95],"aggregated":[98],"without":[99],"requiring":[100],"decryption":[101],"is":[103],"desirable":[105],"feature":[106],"distributed":[108],"environments.":[109]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
