{"id":"https://openalex.org/W1675929572","doi":"https://doi.org/10.3233/jcs-2009-0374","title":"An efficient signcryption scheme with key privacy and its extension to ring signcryption","display_name":"An efficient signcryption scheme with key privacy and its extension to ring signcryption","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W1675929572","doi":"https://doi.org/10.3233/jcs-2009-0374","mag":"1675929572"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2009-0374","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0374","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8402&amp;amp;context=sis_research","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086863932","display_name":"Chung Ki Li","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Chung Ki Li","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091475823","display_name":"Guomin Yang","orcid":"https://orcid.org/0000-0002-4949-7738"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Guomin Yang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100638710","display_name":"Xiaotie Deng","orcid":"https://orcid.org/0000-0002-5282-6467"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiaotie Deng","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: , , ,","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, China. E-mails: travisli@cs.cityu.edu.hk, csyanggm@cs.cityu.edu.hk, duncan@cs.cityu.edu.hk, deng@cs.cityu.edu.hk","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I36672615","display_name":"Courant Institute of Mathematical Sciences","ror":"https://ror.org/037tm7f56","country_code":"US","type":"education","lineage":["https://openalex.org/I36672615","https://openalex.org/I57206974"]},{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherman S.M. Chow","raw_affiliation_strings":["Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY 10012, USA","Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY 10012, USA. E-mail: schow@cs.nyu.edu#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY 10012, USA","institution_ids":["https://openalex.org/I36672615","https://openalex.org/I57206974"]},{"raw_affiliation_string":"Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY 10012, USA. E-mail: schow@cs.nyu.edu#TAB#","institution_ids":["https://openalex.org/I36672615"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086863932"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":1.8619,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.86805722,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"18","issue":"3","first_page":"451","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9764423370361328},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.710712194442749},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6948102712631226},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6869412660598755},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.48171406984329224},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43286508321762085},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4314740002155304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34203803539276123},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3332069516181946},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.290477454662323},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28733158111572266},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18815842270851135},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0605047345161438}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9764423370361328},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.710712194442749},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6948102712631226},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869412660598755},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.48171406984329224},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43286508321762085},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4314740002155304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34203803539276123},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3332069516181946},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.290477454662323},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28733158111572266},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18815842270851135},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0605047345161438},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-2009-0374","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0374","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8402","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8402&amp;amp;context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://doi.org/10.5555/1835402.1835406","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8402","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8402&amp;amp;context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://doi.org/10.5555/1835402.1835406","raw_type":"Journal Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1504092670","https://openalex.org/W1504307241","https://openalex.org/W1510433380","https://openalex.org/W1516634197","https://openalex.org/W1524651855","https://openalex.org/W1569083856","https://openalex.org/W1569204576","https://openalex.org/W1571093585","https://openalex.org/W1577025491","https://openalex.org/W1589176872","https://openalex.org/W1599446772","https://openalex.org/W1610688607","https://openalex.org/W1760090598","https://openalex.org/W1788452017","https://openalex.org/W2024757849","https://openalex.org/W2052267638","https://openalex.org/W2088938509","https://openalex.org/W2100647543","https://openalex.org/W2103627472","https://openalex.org/W2110740499","https://openalex.org/W2129483619","https://openalex.org/W2148437174","https://openalex.org/W2151413173","https://openalex.org/W2152924492","https://openalex.org/W2396431933","https://openalex.org/W2913622301"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W1531601525","https://openalex.org/W3195032220","https://openalex.org/W2107536344","https://openalex.org/W4387988068","https://openalex.org/W2015242147","https://openalex.org/W2551652499","https://openalex.org/W2951198869","https://openalex.org/W2086251583"],"abstract_inverted_index":{"In":[0,51],"Information":[1],"Processing":[2],"Letters":[3],"(2006),":[4],"Tan":[5],"pointed":[6],"out":[7],"that":[8,81],"the":[9,63,67,113],"anonymous":[10],"signcryption":[11,109],"scheme":[12,38,47,60,69,83,102,110],"proposed":[13],"by":[14,111],"Yang,":[15],"Wong":[16],"and":[17,42,75,88,103,120],"Deng":[18],"(YWD)":[19],"in":[20],"ISC":[21],"2005":[22],"provides":[23],"neither":[24],"confidentiality":[25],"nor":[26],"anonymity.":[27],"However,":[28],"no":[29,45],"discussion":[30],"has":[31],"been":[32],"made":[33,41],"on":[34],"how":[35],"a":[36,56,98,107],"secure":[37,46],"can":[39],"be":[40],"there":[43],"is":[44],"available":[48],"to":[49,106,116],"date.":[50],"this":[52],"paper,":[53],"we":[54,79],"propose":[55],"modification":[57],"of":[58,66,100],"YWD":[59],"which":[61],"resolves":[62],"security":[64],"issues":[65],"original":[68],"without":[70],"sacrificing":[71],"its":[72],"high":[73],"efficiency":[74],"simple":[76],"design.":[77],"Indeed,":[78],"show":[80],"our":[82,101],"achieves":[84],"confidentiality,":[85],"existential":[86],"unforgeability":[87],"anonymity":[89],"with":[90],"more":[91],"precise":[92],"reduction":[93],"bounds.":[94],"We":[95],"also":[96],"give":[97],"variation":[99],"extend":[104],"it":[105],"ring":[108],"using":[112],"technique":[114],"due":[115],"Boneh,":[117],"Gentry,":[118],"Lynn":[119],"Shacham.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
