{"id":"https://openalex.org/W3049227096","doi":"https://doi.org/10.1142/s0129054120500252","title":"Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting","display_name":"Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3049227096","doi":"https://doi.org/10.1142/s0129054120500252","mag":"3049227096"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054120500252","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054120500252","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007024735","display_name":"Juyan Li","orcid":"https://orcid.org/0000-0003-2721-2655"},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juyan Li","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China","College of Data Science and Technology, Heilongjiang University, Harbin 150080, P. R. China"],"raw_orcid":"https://orcid.org/0000-0003-2721-2655","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Data Science and Technology, Heilongjiang University, Harbin 150080, P. R. China","institution_ids":["https://openalex.org/I1300757298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101770865","display_name":"Chunguang Ma","orcid":"https://orcid.org/0000-0003-4988-7856"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunguang Ma","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, P. R. China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043097037","display_name":"Zhen Gu","orcid":"https://orcid.org/0000-0003-1480-458X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Gu","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007024735"],"corresponding_institution_ids":["https://openalex.org/I1300757298","https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.8154,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79233144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"31","issue":"05","first_page":"551","last_page":"567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8570634126663208},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6077597737312317},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.6028233170509338},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.6020355224609375},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5706435441970825},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5523539185523987},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.5436661839485168},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5307749509811401},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5272295475006104},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.48967626690864563},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.484599232673645},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4828246533870697},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4676387310028076},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.46504393219947815},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4359986186027527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35287246108055115},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.335326611995697}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8570634126663208},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6077597737312317},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.6028233170509338},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.6020355224609375},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5706435441970825},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5523539185523987},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.5436661839485168},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5307749509811401},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5272295475006104},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.48967626690864563},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.484599232673645},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4828246533870697},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4676387310028076},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.46504393219947815},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4359986186027527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35287246108055115},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.335326611995697},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054120500252","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054120500252","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2996362919","display_name":null,"funder_award_id":"61472097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W46948259","https://openalex.org/W74973629","https://openalex.org/W190530026","https://openalex.org/W805594969","https://openalex.org/W1502927489","https://openalex.org/W1517738348","https://openalex.org/W1590823599","https://openalex.org/W1620415689","https://openalex.org/W1881831204","https://openalex.org/W1890078278","https://openalex.org/W1929726994","https://openalex.org/W1967741657","https://openalex.org/W1993032872","https://openalex.org/W2014671777","https://openalex.org/W2038761522","https://openalex.org/W2043533815","https://openalex.org/W2061949491","https://openalex.org/W2069419378","https://openalex.org/W2099908358","https://openalex.org/W2114428623","https://openalex.org/W2120976781","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2161214567","https://openalex.org/W2183260167","https://openalex.org/W2185608065","https://openalex.org/W2491697371","https://openalex.org/W2505122866","https://openalex.org/W2531399365","https://openalex.org/W2787060144","https://openalex.org/W2979952026","https://openalex.org/W4210300416"],"related_works":["https://openalex.org/W2151919461","https://openalex.org/W3208665719","https://openalex.org/W1535818082","https://openalex.org/W2139343945","https://openalex.org/W1591615993","https://openalex.org/W1882142576","https://openalex.org/W2184527158","https://openalex.org/W1591501556","https://openalex.org/W2368405831","https://openalex.org/W3049227096"],"abstract_inverted_index":{"Proxy":[0],"Re-Encryption":[1],"(PRE)":[2],"is":[3,80,95],"a":[4,9,17],"cryptographic":[5],"primitive":[6],"that":[7,78],"allows":[8],"proxy":[10],"to":[11,44],"turn":[12],"an":[13,42,92],"Alice\u2019s":[14],"ciphertext":[15,19],"into":[16],"Bob\u2019s":[18],"on":[20,88],"the":[21,26,53,63,72,84,89,98],"same":[22],"plaintext.":[23],"All":[24],"of":[25],"PRE":[27],"schemes":[28],"are":[29],"public":[30,46],"key":[31,47],"encryption":[32,48],"and":[33],"semantic":[34],"security.":[35],"Deterministic":[36],"Public":[37],"Key":[38],"Encryption":[39],"(D-PKE)":[40],"provides":[41],"alternative":[43],"randomized":[45],"in":[49,71,83],"various":[50],"scenarios":[51],"where":[52],"latter":[54],"exhibits":[55],"inherent":[56],"drawbacks.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"construct":[62],"first":[64],"multi-use":[65],"unidirectional":[66],"D-PRE":[67,94],"scheme":[68],"from":[69,97],"Lattices":[70],"auxiliary-input":[73],"setting.":[74],"We":[75],"also":[76],"prove":[77],"it":[79],"PRIV1-INDr":[81],"secure":[82],"standard":[85],"model":[86],"based":[87],"LWR.":[90],"Finally,":[91],"identity-based":[93],"obtained":[96],"basic":[99],"construction.":[100]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
