{"id":"https://openalex.org/W2091337187","doi":"https://doi.org/10.1145/1036921.1036927","title":"ARECA","display_name":"ARECA","publication_year":2003,"publication_date":"2003-10-31","ids":{"openalex":"https://openalex.org/W2091337187","doi":"https://doi.org/10.1145/1036921.1036927","mag":"2091337187"},"language":"en","primary_location":{"id":"doi:10.1145/1036921.1036927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1036921.1036927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033745290","display_name":"Jiwu Jing","orcid":"https://orcid.org/0000-0002-3409-6149"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jiwu Jing","raw_affiliation_strings":["Graduate School of CAS, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346764","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0001-8237-5807"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["The Pennsylvania State University, PA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, PA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790997","display_name":"Dengguo Feng","orcid":"https://orcid.org/0000-0002-8515-7124"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengguo Feng","raw_affiliation_strings":["Institute Of Software, China"],"affiliations":[{"raw_affiliation_string":"Institute Of Software, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100718017","display_name":"Xiang Ji","orcid":"https://orcid.org/0000-0002-7234-6460"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Xiang","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, China","[Graduate School of Chinese Academy of Sciences, China]"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"[Graduate School of Chinese Academy of Sciences, China]","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072074260","display_name":"Neng Gao","orcid":"https://orcid.org/0000-0002-0870-5692"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Neng Gao","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, China","[Graduate School of Chinese Academy of Sciences, China]"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"[Graduate School of Chinese Academy of Sciences, China]","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075421344","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-2639-3722"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, China","[Graduate School of Chinese Academy of Sciences, China]"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"[Graduate School of Chinese Academy of Sciences, China]","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5033745290"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9139,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8088168,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"53","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7027972340583801},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6445983648300171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6128306984901428},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5417514443397522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49892473220825195},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4981667995452881},{"id":"https://openalex.org/keywords/areca","display_name":"Areca","score":0.4756457507610321},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15813562273979187},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10023185610771179}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7027972340583801},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6445983648300171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6128306984901428},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5417514443397522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49892473220825195},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4981667995452881},{"id":"https://openalex.org/C2779741799","wikidata":"https://www.wikidata.org/wiki/Q157289","display_name":"Areca","level":3,"score":0.4756457507610321},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15813562273979187},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10023185610771179},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C206391251","wikidata":"https://www.wikidata.org/wiki/Q1186738","display_name":"Nut","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1036921.1036927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1036921.1036927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2095202767","https://openalex.org/W2097070787","https://openalex.org/W2112138431","https://openalex.org/W2141420453","https://openalex.org/W2147270806","https://openalex.org/W2352743263","https://openalex.org/W2561675875","https://openalex.org/W6676935346","https://openalex.org/W6680272779","https://openalex.org/W7010732992"],"related_works":["https://openalex.org/W2737319251","https://openalex.org/W2318707402","https://openalex.org/W3118738851","https://openalex.org/W2366296353","https://openalex.org/W2126037447","https://openalex.org/W2888183313","https://openalex.org/W4243688874","https://openalex.org/W4252709806","https://openalex.org/W2081673223","https://openalex.org/W767161385"],"abstract_inverted_index":{"Certification":[0],"Authorities":[1],"(CA)":[2],"are":[3,76,137],"a":[4,8,15,33,58,61,72,87,157,165,171,196],"critical":[5],"component":[6,107],"of":[7,25,42,51,57,63,86,95,108,124,151,198],"PKI.":[9],"All":[10],"the":[11,21,26,39,55,96,109,115,120,140,149],"certificates":[12],"issued":[13],"by":[14,91,103],"CA":[16,27,59,88,110,167],"will":[17],"become":[18],"invalid":[19],"when":[20,71],"(signing)":[22,100],"private":[23,40,84,116],"key":[24,41,85,97],"is":[28,32,89,111,153,174],"compromised.":[29],"Hence":[30],"it":[31,127,155],"very":[34,128],"important":[35],"issue":[36],"to":[37,98,113,130,142,180],"protect":[38],"an":[43,144],"online":[44],"CA.":[45],"ARECA":[46,66,125,152,173],"systems,":[47],"built":[48],"on":[49],"top":[50],"threshold":[52],"cryptography,":[53],"ensure":[54],"security":[56],"through":[60],"series":[62],"defense-in-depth":[64],"protections.":[65],"systems":[67],"won't":[68],"be":[69],"compromised":[70,77],"few":[73],"system":[74,80,122],"components":[75,101],"or":[78,189],"some":[79],"administrators":[81],"betray.":[82],"The":[83],"protected":[90],"distributing":[92],"different":[93,99],"shares":[94],"and":[102,148,164,183,192],"ensuring":[104],"that":[105,154,186],"any":[106],"unable":[112],"reconstruct":[114],"key.":[117],"In":[118],"addition,":[119],"multi-layer":[121,166],"architecture":[123],"makes":[126],"difficult":[129],"attack":[131],"from":[132],"outside.":[133],"Several":[134],"threshold-cryptography-based":[135],"methods":[136],"proposed":[138],"in":[139],"literature":[141],"construct":[143],"intrusion":[145],"tolerant":[146],"CA,":[147],"uniqueness":[150],"engineers":[156],"novel":[158],"two":[159],"phase":[160],"signature":[161],"composition":[162],"scheme":[163],"protection":[168],"architecture.":[169],"As":[170],"result,":[172],"(a)":[175],"practical,":[176],"(b)":[177],"highly":[178],"resilient":[179],"both":[181],"insider":[182],"outsider":[184],"attacks":[185],"compromise":[187],"one":[188],"more":[190],"components,":[191],"(c)":[193],"can":[194],"prevent":[195],"variety":[197],"outside":[199],"attacks.":[200]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
