{"id":"https://openalex.org/W4404803098","doi":"https://doi.org/10.1515/jmc-2023-0012","title":"Revocable policy-based chameleon hash using lattices","display_name":"Revocable policy-based chameleon hash using lattices","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404803098","doi":"https://doi.org/10.1515/jmc-2023-0012"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2023-0012","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0012","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1515/jmc-2023-0012","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026436506","display_name":"Jean Belo Klamti","orcid":"https://orcid.org/0000-0001-9231-1129"},"institutions":[{"id":"https://openalex.org/I4210159778","display_name":"National Research Council Canada","ror":"https://ror.org/04mte1k06","country_code":"CA","type":"government","lineage":["https://openalex.org/I4210159778"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jean Belo Klamti","raw_affiliation_strings":["National Research Council Canada , Ottawa , Ontario , Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Research Council Canada , Ottawa , Ontario , Canada","institution_ids":["https://openalex.org/I4210159778"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111155222","display_name":"M. Anwarul Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammed Anwarul Hasan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo , Waterloo , ON , Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo , Waterloo , ON , Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026436506"],"corresponding_institution_ids":["https://openalex.org/I4210159778"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.3254,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67975425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"18","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6923156380653381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5464627742767334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42426174879074097},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3796793222427368}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6923156380653381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5464627742767334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42426174879074097},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3796793222427368}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1515/jmc-2023-0012","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0012","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:cisti-icist.nrc-cnrc.ca:cistinparc:a586405b-8a5f-4a8c-960b-1ceb5b355aa9","is_oa":true,"landing_page_url":"https://nrc-publications.canada.ca/eng/view/object/?id=a586405b-8a5f-4a8c-960b-1ceb5b355aa9","pdf_url":"https://nrc-publications.canada.ca/eng/view/ft/?id=a586405b-8a5f-4a8c-960b-1ceb5b355aa9","source":{"id":"https://openalex.org/S7407055245","display_name":"NPARC","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:5605e8565d88451b9b5f5fa15e9ab2a4","is_oa":false,"landing_page_url":"https://doaj.org/article/5605e8565d88451b9b5f5fa15e9ab2a4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp p. 152-82 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2023-0012","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0012","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306192","display_name":"Silicon Valley Community Foundation","ror":"https://ror.org/001ader08"},{"id":"https://openalex.org/F4320307285","display_name":"Impact Fund","ror":"https://ror.org/00jb20j87"},{"id":"https://openalex.org/F4320322676","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W21280657","https://openalex.org/W39036742","https://openalex.org/W74973629","https://openalex.org/W121367636","https://openalex.org/W1520478394","https://openalex.org/W1531217702","https://openalex.org/W1537360597","https://openalex.org/W1555882766","https://openalex.org/W1596726599","https://openalex.org/W1653866131","https://openalex.org/W1718283113","https://openalex.org/W1963071371","https://openalex.org/W1983370494","https://openalex.org/W2007466965","https://openalex.org/W2010507480","https://openalex.org/W2038761522","https://openalex.org/W2117362057","https://openalex.org/W2130410178","https://openalex.org/W2138001464","https://openalex.org/W2142048307","https://openalex.org/W2168571148","https://openalex.org/W2590233175","https://openalex.org/W2612903716","https://openalex.org/W2724185994","https://openalex.org/W2811025351","https://openalex.org/W2903348552","https://openalex.org/W2915032814","https://openalex.org/W2948007978","https://openalex.org/W2968316219","https://openalex.org/W3006584202","https://openalex.org/W3023219121","https://openalex.org/W3083129593","https://openalex.org/W3169426187","https://openalex.org/W3201968473","https://openalex.org/W3214313492","https://openalex.org/W3217302241","https://openalex.org/W4306931981","https://openalex.org/W4327892673"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W3023219121","https://openalex.org/W2035244949"],"abstract_inverted_index":{"Abstract":[0],"A":[1],"chameleon":[2,66,150],"hash":[3,9,67],"function":[4,10],"is":[5,35,100],"a":[6,13,25,64,86,146],"type":[7],"of":[8,24,41,46,108],"that":[11,57,99],"involves":[12],"trapdoor":[14,48,71],"to":[15,37,121,144],"help":[16],"find":[17],"collisions,":[18],"i.e.,":[19],"it":[20,34],"allows":[21],"the":[22,29,39,43,47],"rewriting":[23,44],"message":[26],"without":[27],"modifying":[28],"hash.":[30,151],"For":[31],"some":[32],"applications,":[33],"important":[36],"have":[38],"feature":[40],"revoking":[42],"privilege":[45],"holder.":[49],"In":[50],"this":[51],"paper,":[52],"using":[53],"lattice-based":[54,65],"hard":[55],"problems":[56],"are":[58],"considered":[59],"quantum-safe,":[60],"we":[61,128],"first":[62],"introduce":[63],"with":[68],"an":[69],"ephemeral":[70],"<m:math":[72,91,114,131,138],"xmlns:m=\"http://www.w3.org/1998/Math/MathML\">":[73,92,115,132,139],"<m:mrow>":[74,76],"<m:mo>(</m:mo>":[75],"<m:mi":[77,93,116,133,140],"mathvariant=\"sans-serif\">CHET</m:mi>":[78,134],"</m:mrow>":[79,81],"<m:mo>)</m:mo>":[80],"</m:math>":[82,95,118,135,142],"\\left({\\mathsf{CHET}})":[83],"and":[84,111,137],"then":[85],"revocable":[87,148],"attribute-based":[88],"encryption":[89],"(":[90],"mathvariant=\"sans-serif\">RABE</m:mi>":[94,117,141],"{\\mathsf{RABE}}":[96,119,143],")":[97],"scheme":[98,120],"adaptively":[101],"indistinguishable.":[102],"We":[103],"also":[104],"give":[105],"security":[106],"analyses":[107],"our":[109,113,130],"schemes":[110,124],"compare":[112],"two":[122],"relevant":[123],"proposed":[125],"recently.":[126],"Furthermore,":[127],"combine":[129],"{\\mathsf{CHET}}":[136],"design":[145],"new":[147],"policy-based":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2024-11-29T00:00:00"}
