{"id":"https://openalex.org/W4388478871","doi":"https://doi.org/10.1186/s42400-023-00189-2","title":"Verifiable delay functions and delay encryptions from hyperelliptic curves","display_name":"Verifiable delay functions and delay encryptions from hyperelliptic curves","publication_year":2023,"publication_date":"2023-11-08","ids":{"openalex":"https://openalex.org/W4388478871","doi":"https://doi.org/10.1186/s42400-023-00189-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00189-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00189-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00189-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00189-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100408301","display_name":"Chao Chen","orcid":"https://orcid.org/0000-0001-6488-224X"},"institutions":[{"id":"https://openalex.org/I4210098034","display_name":"Key Laboratory of Guangdong Province","ror":"https://ror.org/00swtqp09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210098034"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Chen","raw_affiliation_strings":["Guangdong Province Key Laboratory of Information Security Technology, Guangzhou, 510006, China","School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Province Key Laboratory of Information Security Technology, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I4210098034"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005731945","display_name":"Fangguo Zhang","orcid":"https://orcid.org/0000-0002-0486-6413"},"institutions":[{"id":"https://openalex.org/I4210098034","display_name":"Key Laboratory of Guangdong Province","ror":"https://ror.org/00swtqp09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210098034"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangguo Zhang","raw_affiliation_strings":["Guangdong Province Key Laboratory of Information Security Technology, Guangzhou, 510006, China","School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Province Key Laboratory of Information Security Technology, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I4210098034"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100408301"],"corresponding_institution_ids":["https://openalex.org/I157773358","https://openalex.org/I4210098034"],"apc_list":null,"apc_paid":null,"fwci":0.45,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70862323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7716553211212158},{"id":"https://openalex.org/keywords/hyperelliptic-curve-cryptography","display_name":"Hyperelliptic curve cryptography","score":0.6029037237167358},{"id":"https://openalex.org/keywords/hyperelliptic-curve","display_name":"Hyperelliptic curve","score":0.596123218536377},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5674048662185669},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5538979172706604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5242481827735901},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4772762656211853},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.45636504888534546},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4557473659515381},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43419724702835083},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41119861602783203},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.39108705520629883},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3331616222858429},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.322098970413208},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.30584269762039185},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3015199303627014},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.264748215675354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19187289476394653},{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.15632426738739014}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7716553211212158},{"id":"https://openalex.org/C166780011","wikidata":"https://www.wikidata.org/wiki/Q3005926","display_name":"Hyperelliptic curve cryptography","level":5,"score":0.6029037237167358},{"id":"https://openalex.org/C11074058","wikidata":"https://www.wikidata.org/wiki/Q850110","display_name":"Hyperelliptic curve","level":3,"score":0.596123218536377},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5674048662185669},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5538979172706604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5242481827735901},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4772762656211853},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.45636504888534546},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4557473659515381},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43419724702835083},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41119861602783203},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.39108705520629883},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3331616222858429},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.322098970413208},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.30584269762039185},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3015199303627014},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.264748215675354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19187289476394653},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.15632426738739014},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00189-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00189-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00189-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5bc7bc2242db4dfdba572f54a80a4579","is_oa":true,"landing_page_url":"https://doaj.org/article/5bc7bc2242db4dfdba572f54a80a4579","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-12 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00189-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00189-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00189-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G384178317","display_name":null,"funder_award_id":"02008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5375606191","display_name":null,"funder_award_id":"2019B030302008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G589118098","display_name":null,"funder_award_id":"61972429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6744699187","display_name":null,"funder_award_id":"62272491","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8955107213","display_name":null,"funder_award_id":"Major","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388478871.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W600997534","https://openalex.org/W1537838966","https://openalex.org/W1610688607","https://openalex.org/W1987475429","https://openalex.org/W1990220158","https://openalex.org/W2046350783","https://openalex.org/W2047000063","https://openalex.org/W2055369887","https://openalex.org/W2084688350","https://openalex.org/W2086042811","https://openalex.org/W2137709159","https://openalex.org/W2150435208","https://openalex.org/W2219615983","https://openalex.org/W2739845435","https://openalex.org/W2752929869","https://openalex.org/W2790485266","https://openalex.org/W2795301572","https://openalex.org/W2884026699","https://openalex.org/W2953744829","https://openalex.org/W2990498574","https://openalex.org/W3029088028","https://openalex.org/W3103284479","https://openalex.org/W3104132538","https://openalex.org/W3119270867","https://openalex.org/W4205348036","https://openalex.org/W4214885838","https://openalex.org/W4236075731","https://openalex.org/W4254894701","https://openalex.org/W4323921570","https://openalex.org/W4365810595","https://openalex.org/W4365934498"],"related_works":["https://openalex.org/W2066391825","https://openalex.org/W2349978047","https://openalex.org/W2390281381","https://openalex.org/W3144994042","https://openalex.org/W2081493886","https://openalex.org/W1504840848","https://openalex.org/W2496249880","https://openalex.org/W1584180009","https://openalex.org/W2386523546","https://openalex.org/W1592482282"],"abstract_inverted_index":{"Abstract":[0],"Verifiable":[1],"delay":[2,6,57,103],"functions":[3,147],"(VDFs)":[4],"and":[5,34,47,64,113,148],"encryptions":[7],"(DEs)":[8],"are":[9,19,66,133],"two":[10],"important":[11],"primitives":[12],"in":[13,81],"decentralized":[14],"systems,":[15],"while":[16],"existing":[17],"constructions":[18],"mainly":[20],"based":[21],"on":[22,36],"time-lock":[23],"puzzles.":[24],"A":[25],"disparate":[26],"framework":[27],"has":[28],"been":[29],"established":[30],"by":[31,110],"applying":[32],"isogenies":[33,46,140],"pairings":[35,49],"elliptic":[37],"curves.":[38],"Following":[39],"this":[40],"line,":[41],"we":[42,72,129],"first":[43,135],"employ":[44],"Richelot":[45],"non-degenerate":[48],"from":[50,105,138,142],"hyperelliptic":[51,106],"curves":[52,107],"for":[53,68,93],"a":[54,101],"new":[55],"verifiable":[56],"function,":[58],"such":[59],"that":[60,74],"no":[61],"auxiliary":[62],"proof":[63],"interaction":[65],"needed":[67],"the":[69,90,98,119,134],"verification.":[70],"Then,":[71],"demonstrate":[73],"our":[75,83,123],"scheme":[76],"satisfies":[77],"all":[78],"security":[79],"requirements,":[80],"particular,":[82],"VDF":[84,124],"can":[85],"resist":[86],"several":[87],"attacks,":[88],"including":[89],"latest":[91],"attacks":[92],"SIDH.":[94],"Besides,":[95],"resorting":[96],"to":[97],"same":[99],"techniques,":[100],"secure":[102],"encryption":[104],"is":[108],"constructed":[109],"modifying":[111],"Boneh":[112],"Frankiln\u2019s":[114],"IBE":[115],"scheme,":[116],"which":[117],"shares":[118],"identical":[120],"setup":[121],"with":[122],"scheme.":[125],"As":[126],"far":[127],"as":[128],"know,":[130],"these":[131],"schemes":[132],"cryptographic":[136],"applications":[137],"high-genus":[139],"apart":[141],"basic":[143],"protocols,":[144],"i.e.,":[145],"hash":[146],"key":[149],"exchange":[150],"protocols.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2025-10-10T00:00:00"}
