{"id":"https://openalex.org/W3091587571","doi":"https://doi.org/10.3233/jifs-189166","title":"An hyper elliptic curve based efficient signcryption scheme for user authentication","display_name":"An hyper elliptic curve based efficient signcryption scheme for user authentication","publication_year":2020,"publication_date":"2020-10-02","ids":{"openalex":"https://openalex.org/W3091587571","doi":"https://doi.org/10.3233/jifs-189166","mag":"3091587571"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189166","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189166","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031631739","display_name":"Malathi Devarajan","orcid":null},"institutions":[{"id":"https://openalex.org/I932239252","display_name":"SASTRA University","ror":"https://ror.org/032jk8892","country_code":"IN","type":"education","lineage":["https://openalex.org/I932239252"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Malathi Devarajan","raw_affiliation_strings":["School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India","institution_ids":["https://openalex.org/I932239252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066996995","display_name":"N. Sasikaladevi","orcid":null},"institutions":[{"id":"https://openalex.org/I932239252","display_name":"SASTRA University","ror":"https://ror.org/032jk8892","country_code":"IN","type":"education","lineage":["https://openalex.org/I932239252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Sasikaladevi","raw_affiliation_strings":["School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India","institution_ids":["https://openalex.org/I932239252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031631739"],"corresponding_institution_ids":["https://openalex.org/I932239252"],"apc_list":null,"apc_paid":null,"fwci":0.5338,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75384783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"39","issue":"6","first_page":"8487","last_page":"8498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9641189575195312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7534024715423584},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.6820809245109558},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6306124925613403},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5026776790618896},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48905929923057556},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45762547850608826},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.4147421419620514},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4042412340641022},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3402498960494995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3004773259162903},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23523399233818054}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9641189575195312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7534024715423584},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.6820809245109558},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6306124925613403},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5026776790618896},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48905929923057556},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45762547850608826},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.4147421419620514},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4042412340641022},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3402498960494995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3004773259162903},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23523399233818054}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189166","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189166","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W52389305","https://openalex.org/W189863370","https://openalex.org/W1559063645","https://openalex.org/W1970254695","https://openalex.org/W2002635145","https://openalex.org/W2015214655","https://openalex.org/W2029693536","https://openalex.org/W2032498319","https://openalex.org/W2034678100","https://openalex.org/W2113840257","https://openalex.org/W2117064875","https://openalex.org/W2123859960","https://openalex.org/W2131789459","https://openalex.org/W2141643485","https://openalex.org/W2165526921","https://openalex.org/W2613792733","https://openalex.org/W2770066703","https://openalex.org/W2790612120","https://openalex.org/W2912690715","https://openalex.org/W2952984876","https://openalex.org/W2966135632","https://openalex.org/W3102407218","https://openalex.org/W3128228167","https://openalex.org/W4250344549","https://openalex.org/W6678492825","https://openalex.org/W6738122879","https://openalex.org/W6789967209"],"related_works":["https://openalex.org/W2183090641","https://openalex.org/W1586636506","https://openalex.org/W2015214655","https://openalex.org/W3209695433","https://openalex.org/W90428525","https://openalex.org/W2352196398","https://openalex.org/W4377234699","https://openalex.org/W2908275895","https://openalex.org/W3091587571","https://openalex.org/W2520732311"],"abstract_inverted_index":{"With":[0],"ever":[1],"growing":[2],"popularity,":[3],"wireless":[4],"communication":[5,114],"system":[6],"also":[7],"vulnerable":[8],"to":[9,42,79],"various":[10],"security":[11,135,149],"attacks.":[12],"To":[13],"provide":[14],"high":[15],"level":[16],"security,":[17],"many":[18],"cryptographic":[19],"solutions":[20],"have":[21],"been":[22],"proposed.":[23],"One":[24],"such":[25],"solution":[26],"is":[27,48,89,101,153],"signcryption,":[28],"where":[29],"authenticity":[30],"and":[31,69,113,141],"confidentiality":[32],"provided":[33],"by":[34,116],"single":[35],"logical":[36],"step.":[37],"Therefore,":[38],"signcryption":[39,87],"scheme":[40,132],"helps":[41],"reduce":[43],"computational":[44],"cost,":[45],"but":[46],"it":[47],"not":[49],"feasible":[50],"for":[51,125],"resource":[52,126],"constraint":[53,127],"environments.":[54,128],"Because,":[55],"most":[56],"of":[57,111,120,150],"the":[58,85,109,118,130,145,148,151],"existing":[59],"approaches":[60],"were":[61],"based":[62,91],"on":[63,92],"El-Gamal,":[64],"bilinear":[65],"pairing,":[66],"Rivest-Shamir-Adleman":[67],"(RSA),":[68],"Elliptic":[70,94],"curve":[71],"Cryptography":[72],"(ECC).":[73],"They":[74],"consume":[75],"more":[76],"energy":[77],"due":[78],"their":[80],"increased":[81],"key":[82,99],"size.":[83],"Hence,":[84],"new":[86],"approach":[88,152],"proposed":[90,131],"Hyper":[93],"Curve":[95],"Cryptosystem":[96],"(HECC)":[97],"whose":[98],"size":[100],"much":[102],"lesser":[103],"than":[104],"ECC.":[105],"It":[106],"significantly":[107],"reduces":[108],"cost":[110],"computation":[112],"overhead":[115],"half":[117],"amount":[119],"ECC":[121],"which":[122],"suits":[123],"well":[124],"Further,":[129],"attains":[133],"necessary":[134],"features":[136],"along":[137],"with":[138],"forward":[139],"secrecy":[140],"public":[142],"verifiability.":[143],"On":[144],"other":[146],"hand,":[147],"validated":[154],"through":[155],"an":[156],"automated":[157],"protocol":[158],"validation":[159],"tool":[160],"\u2013":[161],"AVISPA.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
