{"id":"https://openalex.org/W3095424429","doi":"https://doi.org/10.1515/jmc-2019-0036","title":"Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)","display_name":"Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3095424429","doi":"https://doi.org/10.1515/jmc-2019-0036","mag":"3095424429"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2019-0036","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0036","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0036/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0036/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011460496","display_name":"Giovanni Di Crescenzo","orcid":"https://orcid.org/0000-0002-5138-1144"},"institutions":[{"id":"https://openalex.org/I4210136737","display_name":"Reproductive Medicine Associates of New Jersey","ror":"https://ror.org/03nyxbd27","country_code":"US","type":"other","lineage":["https://openalex.org/I4210136737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Giovanni Di Crescenzo","raw_affiliation_strings":["Perspecta Labs Inc . Basking Ridge , NJ , United States of America","Perspecta Labs Inc. Basking Ridge, NJ, United States of America"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs Inc . Basking Ridge , NJ , United States of America","institution_ids":["https://openalex.org/I4210136737"]},{"raw_affiliation_string":"Perspecta Labs Inc. Basking Ridge, NJ, United States of America","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021581779","display_name":"Matluba Khodjaeva","orcid":null},"institutions":[{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matluba Khodjaeva","raw_affiliation_strings":["CUNY John Jay College of Criminal Justice . New York , NY , United States of America","CUNY John Jay College of Criminal Justice. New York, NY, United States of America"],"affiliations":[{"raw_affiliation_string":"CUNY John Jay College of Criminal Justice . New York , NY , United States of America","institution_ids":["https://openalex.org/I92507152"]},{"raw_affiliation_string":"CUNY John Jay College of Criminal Justice. New York, NY, United States of America","institution_ids":["https://openalex.org/I92507152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011373327","display_name":"Delaram Kahrobaei","orcid":"https://orcid.org/0000-0001-5467-7832"},"institutions":[{"id":"https://openalex.org/I4210160613","display_name":"Science City York (United Kingdom)","ror":"https://ror.org/0564zte48","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210160613"]},{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Delaram Kahrobaei","raw_affiliation_strings":["University of York . Heslington , York , United Kingdom","University of York. Heslington, York, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of York . Heslington , York , United Kingdom","institution_ids":["https://openalex.org/I52099693","https://openalex.org/I4210160613"]},{"raw_affiliation_string":"University of York. Heslington, York, United Kingdom","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069099041","display_name":"Vladimir Shpilrain","orcid":"https://orcid.org/0000-0003-2239-7996"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vladimir Shpilrain","raw_affiliation_strings":["City University of New York . New , York, NY , United States of America","City University of New York. New, York, NY, United States of America"],"affiliations":[{"raw_affiliation_string":"City University of New York . New , York, NY , United States of America","institution_ids":["https://openalex.org/I174216632"]},{"raw_affiliation_string":"City University of New York. New, York, NY, United States of America","institution_ids":["https://openalex.org/I174216632"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011460496"],"corresponding_institution_ids":["https://openalex.org/I4210136737"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.1371,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57033963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14","issue":"1","first_page":"438","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.7322419881820679},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.6696327924728394},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6025744080543518},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5727276802062988},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5459824800491333},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5258104205131531},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5134373903274536},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.50999915599823},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4702645242214203},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4594804048538208},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.43393275141716003},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4224601984024048},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3449613153934479},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.33036506175994873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3227517306804657},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2700508236885071}],"concepts":[{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.7322419881820679},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.6696327924728394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6025744080543518},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5727276802062988},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5459824800491333},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5258104205131531},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5134373903274536},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.50999915599823},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4702645242214203},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4594804048538208},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.43393275141716003},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4224601984024048},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3449613153934479},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33036506175994873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3227517306804657},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2700508236885071},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1515/jmc-2019-0036","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0036","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0036/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:151366","is_oa":true,"landing_page_url":"https://orcid.org/0000-0001-5467-7832>","pdf_url":"https://eprints.whiterose.ac.uk/151366/14/jmc_2019_0036_final.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:bb416b42ae9e449ba53121448fb7ea75","is_oa":true,"landing_page_url":"https://doaj.org/article/bb416b42ae9e449ba53121448fb7ea75","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 438-459 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2019-0036","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0036","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0036/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3095424429.pdf","grobid_xml":"https://content.openalex.org/works/W3095424429.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498685334","https://openalex.org/W1571821840","https://openalex.org/W1975199330","https://openalex.org/W1979698258","https://openalex.org/W1980516015","https://openalex.org/W2027891921","https://openalex.org/W2031533839","https://openalex.org/W2042037294","https://openalex.org/W2052572664","https://openalex.org/W2058780527","https://openalex.org/W2062429446","https://openalex.org/W2095708839","https://openalex.org/W2108834246","https://openalex.org/W2136975477","https://openalex.org/W2156186849","https://openalex.org/W2157679418","https://openalex.org/W2170444562","https://openalex.org/W2573610512","https://openalex.org/W2754422845","https://openalex.org/W2765405339"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W2107014706","https://openalex.org/W28274153","https://openalex.org/W2736837562","https://openalex.org/W3197688203","https://openalex.org/W2776394487","https://openalex.org/W4364860044"],"abstract_inverted_index":{"Abstract":[0],"Many":[1],"public-key":[2],"cryptosystems":[3],"and,":[4],"more":[5],"generally,":[6],"cryptographic":[7,182,230],"protocols,":[8],"use":[9,172],"group":[10],"exponentiations":[11],"as":[12,208,210],"important":[13],"primitive":[14,49],"operations.":[15],"To":[16],"expand":[17],"the":[18,65,72,76,91,103,153,165,177,184,195,224],"applicability":[19],"of":[20,38,44,64,71,78,93,105,134,157,167,180,226],"these":[21],"solutions":[22],"to":[23,51,89,122,175,223],"computationally":[24,33,53],"weaker":[25,34],"devices,":[26],"it":[27],"has":[28],"been":[29,118],"advocated":[30],"that":[31,131],"a":[32,40,52,106,132,139,168],"client":[35,92],"(i.e.,":[36],"capable":[37],"performing":[39],"relatively":[41],"small":[42,83],"number":[43,156],"modular":[45,158],"multiplications)":[46],"delegates":[47],"such":[48,59],"operations":[50],"stronger":[54],"server.":[55],"Important":[56],"requirements":[57],"for":[58,81,102,203],"delegation":[60,104,166,219,225],"protocols":[61,101],"include":[62],"privacy":[63],"client\u2019s":[66,73,154],"input":[67],"exponent":[68],"and":[69,111,120,148,192],"security":[70],"output,":[74],"in":[75,164,199],"sense":[77],"detecting,":[79],"except":[80],"very":[82],"probability,":[84],"any":[85],"malicious":[86],"server\u2019s":[87],"attempt":[88],"convince":[90],"an":[94],"incorrect":[95],"exponentiation":[96],"result.":[97],"Only":[98],"recently,":[99],"efficient":[100,218],"fixed-based":[107],"exponentiation,":[108],"over":[109,138,194],"cyclic":[110,140],"RSA-type":[112],"groups":[113,141],"with":[114,142],"certain":[115,143],"properties,":[116,144],"have":[117],"presented":[119],"proved":[121],"satisfy":[123],"both":[124],"requirements.":[125],"In":[126],"this":[127,173],"paper":[128],"we":[129],"show":[130,176],"product":[133],"many":[135],"fixed-base":[136],"exponentiations,":[137],"can":[145],"be":[146],"privately":[147],"securely":[149],"delegated":[150],"by":[151,189],"keeping":[152],"online":[155],"multiplications":[159],"only":[160],"slightly":[161],"larger":[162],"than":[163],"single":[169,227],"exponentiation.":[170],"We":[171],"result":[174],"first":[178],"delegations":[179],"entire":[181],"schemes:":[183],"well-known":[185],"digital":[186],"signature":[187],"schemes":[188],"El-Gamal,":[190],"Schnorr":[191],"Okamoto,":[193],"q":[196,206],"-order":[197],"subgroup":[198],"\u2124":[200],"p":[201,204],",":[202,205],"primes,":[207],"well":[209],"their":[211],"variants":[212],"based":[213],"on":[214],"elliptic":[215],"curves.":[216],"Previous":[217],"results":[220],"were":[221],"limited":[222],"algorithms":[228],"within":[229],"schemes.":[231]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-11-09T00:00:00"}
