{"id":"https://openalex.org/W2616606400","doi":"https://doi.org/10.1515/jmc-2015-0014","title":"A secure anonymous proxy signcryption scheme","display_name":"A secure anonymous proxy signcryption scheme","publication_year":2017,"publication_date":"2017-05-17","ids":{"openalex":"https://openalex.org/W2616606400","doi":"https://doi.org/10.1515/jmc-2015-0014","mag":"2616606400"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2015-0014","is_oa":false,"landing_page_url":"https://doi.org/10.1515/jmc-2015-0014","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/d29778e207b8411d809daa1294f62726","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046198551","display_name":"Vishal Saraswat","orcid":"https://orcid.org/0000-0001-7082-9568"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vishal Saraswat","raw_affiliation_strings":["R.C. Bose Centre for Cryptology and Cyber Security , Indian Statistical Institute , Kolkata 700108 , India"],"raw_orcid":"https://orcid.org/0000-0001-7082-9568","affiliations":[{"raw_affiliation_string":"R.C. Bose Centre for Cryptology and Cyber Security , Indian Statistical Institute , Kolkata 700108 , India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059626792","display_name":"Rajeev Anand Sahu","orcid":"https://orcid.org/0000-0003-2220-9019"},"institutions":[{"id":"https://openalex.org/I132053463","display_name":"Universit\u00e9 Libre de Bruxelles","ror":"https://ror.org/01r9htc13","country_code":"BE","type":"education","lineage":["https://openalex.org/I132053463"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Rajeev Anand Sahu","raw_affiliation_strings":["Department d\u2019Informatique , Universit\u00e9 Libre de Bruxelles , Brussels , Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department d\u2019Informatique , Universit\u00e9 Libre de Bruxelles , Brussels , Belgium","institution_ids":["https://openalex.org/I132053463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060389372","display_name":"Amit K. Awasthi","orcid":"https://orcid.org/0000-0002-5500-0361"},"institutions":[{"id":"https://openalex.org/I72769676","display_name":"Gautam Buddha University","ror":"https://ror.org/026cfwd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I72769676"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit K. Awasthi","raw_affiliation_strings":["Group for Cryptology Research , Gautam Buddha University , Greater Noida 201308, UP , India"],"raw_orcid":"https://orcid.org/0000-0002-5500-0361","affiliations":[{"raw_affiliation_string":"Group for Cryptology Research , Gautam Buddha University , Greater Noida 201308, UP , India","institution_ids":["https://openalex.org/I72769676"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046198551"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":null,"fwci":0.8323,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.80091246,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"11","issue":"2","first_page":"63","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9906639456748962},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.8650841116905212},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8218419551849365},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7413850426673889},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6585751175880432},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6120848059654236},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.55642169713974},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.4773973524570465},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45811551809310913},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4369136691093445},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38319218158721924},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33743953704833984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.325626939535141},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30065596103668213},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17836910486221313},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.17762622237205505}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9906639456748962},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.8650841116905212},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8218419551849365},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7413850426673889},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6585751175880432},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6120848059654236},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.55642169713974},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.4773973524570465},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45811551809310913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4369136691093445},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38319218158721924},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33743953704833984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.325626939535141},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30065596103668213},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17836910486221313},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.17762622237205505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1515/jmc-2015-0014","is_oa":false,"landing_page_url":"https://doi.org/10.1515/jmc-2015-0014","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:dipot.ulb.ac.be:2013/258261","is_oa":false,"landing_page_url":"http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/258261","pdf_url":null,"source":{"id":"https://openalex.org/S4306401063","display_name":"D\u00e9p\u00f4t institutionnel de l'Universit\u00e9 libre de Bruxelles (Universit\u00e9 Libre de Bruxelles)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132053463","host_organization_name":"Universit\u00e9 Libre de Bruxelles","host_organization_lineage":["https://openalex.org/I132053463"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, 11","raw_type":"info:ulb-repo/semantics/openurl/article"},{"id":"pmh:oai:doaj.org/article:d29778e207b8411d809daa1294f62726","is_oa":true,"landing_page_url":"https://doaj.org/article/d29778e207b8411d809daa1294f62726","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 11, Iss 2, Pp 63-84 (2017)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:d29778e207b8411d809daa1294f62726","is_oa":true,"landing_page_url":"https://doaj.org/article/d29778e207b8411d809daa1294f62726","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 11, Iss 2, Pp 63-84 (2017)","raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W203803423","https://openalex.org/W390718403","https://openalex.org/W1486255205","https://openalex.org/W1501696897","https://openalex.org/W1504092670","https://openalex.org/W1516634197","https://openalex.org/W1525496161","https://openalex.org/W1534616950","https://openalex.org/W1545307139","https://openalex.org/W1562527866","https://openalex.org/W1564713569","https://openalex.org/W1566541866","https://openalex.org/W1655958391","https://openalex.org/W1760090598","https://openalex.org/W1782386758","https://openalex.org/W1832688593","https://openalex.org/W1975895038","https://openalex.org/W1981957073","https://openalex.org/W1991914881","https://openalex.org/W2021612229","https://openalex.org/W2021774134","https://openalex.org/W2022524143","https://openalex.org/W2039432955","https://openalex.org/W2039853042","https://openalex.org/W2052854534","https://openalex.org/W2088938509","https://openalex.org/W2091034061","https://openalex.org/W2102256003","https://openalex.org/W2110740499","https://openalex.org/W2129483619","https://openalex.org/W2147333172","https://openalex.org/W2163170205","https://openalex.org/W2244448351","https://openalex.org/W2395443637"],"related_works":["https://openalex.org/W2107536344","https://openalex.org/W2357912800","https://openalex.org/W2082303399","https://openalex.org/W2357714497","https://openalex.org/W2166815920","https://openalex.org/W2372234643","https://openalex.org/W2348363049","https://openalex.org/W2186860991","https://openalex.org/W2377011442","https://openalex.org/W2090190727"],"abstract_inverted_index":{"Abstract":[0],"We":[1,39,59],"introduce":[2,40],"a":[3,21,41,54],"new":[4],"cryptographic":[5],"primitive":[6],"identity-based":[7,46,87],"anonymous":[8,47,91],"proxy":[9,16,33,48,117,129,138],"signcryption":[10,49,88,92,118,139],"which":[11],"provides":[12,125],"anonymity":[13,126],"to":[14,23,27,127],"the":[15,24,29,32,70,85,109,115,128],"sender":[17,26,34,130],"while":[18],"also":[19,60,107],"providing":[20],"mechanism":[22],"original":[25],"expose":[28],"identity":[30],"of":[31,37,44,111,136],"in":[35],"case":[36],"misuse.":[38],"formal":[42],"definition":[43],"an":[45,62,81],"(IBAPS)":[50],"scheme":[51,64,98,113,124],"and":[52,65,74,90,94,120],"give":[53],"security":[55,68],"model":[56],"for":[57],"it.":[58],"construct":[61],"IBAPS":[63],"prove":[66],"its":[67],"under":[69],"discrete":[71],"logarithm":[72],"assumption":[73],"computational":[75],"Diffie\u2013Hellman":[76],"assumption.":[77],"Moreover,":[78],"we":[79,106],"do":[80],"efficiency":[82,110],"comparison":[83],"with":[84,114],"existing":[86,137],"schemes":[89,93,119],"show":[95,121],"that":[96,122],"our":[97,112,123],"is":[99],"much":[100],"more":[101],"efficient":[102],"than":[103,134],"those":[104,135],"schemes,":[105],"compare":[108],"available":[116],"at":[131],"cost":[132],"less":[133],"schemes.":[140]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2017-05-26T00:00:00"}
