{"id":"https://openalex.org/W2604891135","doi":"https://doi.org/10.3233/978-1-61499-484-8-770","title":"A New Cryptosystem Based on Three Knapsacks with Plaintext Encoding","display_name":"A New Cryptosystem Based on Three Knapsacks with Plaintext Encoding","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2604891135","doi":"https://doi.org/10.3233/978-1-61499-484-8-770","mag":"2604891135"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-484-8-770","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-484-8-770","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026809485","display_name":"Yao-Zhang Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huang Yao-Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003915342","display_name":"Ching\u2010Tsung Hsueh","orcid":null},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsueh Ching-Tsung","raw_affiliation_strings":["National Chung Hsing University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Hsing University, Taichung, Taiwan","institution_ids":["https://openalex.org/I162838928"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110120277","display_name":"Yi-Ju Chiang","orcid":null},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chiang Yi-Ju","raw_affiliation_strings":["National Chung Hsing University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Hsing University, Taichung, Taiwan","institution_ids":["https://openalex.org/I162838928"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085257044","display_name":"Yen\u2010Chieh Ouyang","orcid":"https://orcid.org/0000-0002-4221-2787"},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ouyang Yen-Chieh","raw_affiliation_strings":["National Chung Hsing University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Hsing University, Taichung, Taiwan","institution_ids":["https://openalex.org/I162838928"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026809485"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32181848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"770","last_page":"781"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9039000272750854,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6231923699378967},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6146773099899292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.58380526304245},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.48220551013946533},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4198026657104492},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3300175070762634},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17854943871498108},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12618079781532288},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09419569373130798}],"concepts":[{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6231923699378967},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6146773099899292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.58380526304245},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.48220551013946533},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4198026657104492},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3300175070762634},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17854943871498108},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12618079781532288},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09419569373130798}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-61499-484-8-770","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-484-8-770","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"mag:2604891135","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/conf/intcompsymp/ics2014.html#HuangHCO14","pdf_url":null,"source":{"id":"https://openalex.org/S4306419857","display_name":"International Conference on Supercomputing","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"International Conference on Supercomputing","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2936027227","https://openalex.org/W2910586303","https://openalex.org/W2980642877","https://openalex.org/W3125483290","https://openalex.org/W4297494787","https://openalex.org/W4223601134","https://openalex.org/W1565128838","https://openalex.org/W2949316140","https://openalex.org/W2391199417","https://openalex.org/W2333771478"],"abstract_inverted_index":{"In":[0,23],"this":[1],"paper,":[2],"we":[3,26],"propose":[4,74],"a":[5,30,70],"transformed":[6],"knapsack":[7],"cryptosystem":[8],"by":[9,61],"using":[10,38],"three":[11],"knapsacks":[12,65],"with":[13],"plaintext":[14,31,39,86],"encoding":[15,40,87],"to":[16,28,69],"enhance":[17],"the":[18,46,49,80,85,88],"security":[19],"of":[20,48],"Knapsack":[21],"cryptosystem.":[22],"our":[24,96],"approach":[25],"try":[27],"encode":[29],"before":[32],"encrypting.":[33],"The":[34,57],"benefits":[35],"are":[36],"that":[37],"method":[41],"can":[42,76,90],"not":[43],"only":[44],"increase":[45],"density":[47,82,89],"knapsack,":[50],"but":[51],"also":[52],"reduce":[53],"decrypt":[54],"time":[55],"substantially.":[56],"ciphertext":[58],"is":[59],"composed":[60],"multiplying":[62],"two":[63],"non-superincreasing":[64],"and":[66],"then":[67],"add":[68],"superincreasing":[71],"knapsack.":[72],"Our":[73],"scheme":[75],"be":[77,91],"secure":[78],"against":[79],"low":[81],"attack":[83],"because":[84],"made":[92],"as":[93,95],"large":[94],"desire.":[97]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2017-04-14T00:00:00"}
