{"id":"https://openalex.org/W2969741918","doi":"https://doi.org/10.3390/cryptography3030022","title":"Cryptography with Disposable Backdoors","display_name":"Cryptography with Disposable Backdoors","publication_year":2019,"publication_date":"2019-08-20","ids":{"openalex":"https://openalex.org/W2969741918","doi":"https://doi.org/10.3390/cryptography3030022","mag":"2969741918"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography3030022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030022","pdf_url":"https://www.mdpi.com/2410-387X/3/3/22/pdf?version=1566296219","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/3/3/22/pdf?version=1566296219","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100679596","display_name":"Kai-Min Chung","orcid":"https://orcid.org/0000-0002-3356-369X"},"institutions":[{"id":"https://openalex.org/I84653119","display_name":"Academia Sinica","ror":"https://ror.org/05bxb3784","country_code":"TW","type":"facility","lineage":["https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kai-Min Chung","raw_affiliation_strings":["Academia Sinica, Taipei 11529, Taiwan"],"affiliations":[{"raw_affiliation_string":"Academia Sinica, Taipei 11529, Taiwan","institution_ids":["https://openalex.org/I84653119"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048814613","display_name":"\u039c\u03ac\u03c1\u03b9\u03bf\u03c2 \u0393\u03b5\u03c9\u03c1\u03b3\u03af\u03bf\u03c5","orcid":"https://orcid.org/0000-0003-3321-9124"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]},{"id":"https://openalex.org/I121847817","display_name":"The Graduate Center, CUNY","ror":"https://ror.org/00awd9g61","country_code":"US","type":"education","lineage":["https://openalex.org/I121847817"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Marios Georgiou","raw_affiliation_strings":["The Graduate Center, City University of New York, New York, NY 10035, USA"],"affiliations":[{"raw_affiliation_string":"The Graduate Center, City University of New York, New York, NY 10035, USA","institution_ids":["https://openalex.org/I174216632","https://openalex.org/I121847817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016730083","display_name":"Ching\u2013Yi Lai","orcid":"https://orcid.org/0000-0003-1970-8167"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Yi Lai","raw_affiliation_strings":["Institute of Communications Engineering, National Chiao Tung University, Hsinchu 30010, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Chiao Tung University, Hsinchu 30010, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014862413","display_name":"Vassilis Zikas","orcid":"https://orcid.org/0000-0002-5422-7572"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vassilis Zikas","raw_affiliation_strings":["School of Informatics, University of Edinburgh, South Bridge, Edinburgh EH8 9YL, UK"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Edinburgh, South Bridge, Edinburgh EH8 9YL, UK","institution_ids":["https://openalex.org/I98677209"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048814613"],"corresponding_institution_ids":["https://openalex.org/I121847817","https://openalex.org/I174216632"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.5781,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75806938,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":"3","first_page":"22","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.8117338418960571},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084820508956909},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.7527371644973755},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.6860795021057129},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5917361378669739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5206272006034851},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5025620460510254},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48626816272735596},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.244876891374588}],"concepts":[{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.8117338418960571},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084820508956909},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.7527371644973755},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.6860795021057129},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5917361378669739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5206272006034851},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5025620460510254},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48626816272735596},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.244876891374588},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography3030022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030022","pdf_url":"https://www.mdpi.com/2410-387X/3/3/22/pdf?version=1566296219","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c9b44c21c97a445a93dd1d19e0b1ccf7","is_oa":true,"landing_page_url":"https://doaj.org/article/c9b44c21c97a445a93dd1d19e0b1ccf7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 3, Iss 3, p 22 (2019)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/3/3/22/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography3030022","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography3030022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030022","pdf_url":"https://www.mdpi.com/2410-387X/3/3/22/pdf?version=1566296219","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2969741918.pdf","grobid_xml":"https://content.openalex.org/works/W2969741918.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W93974325","https://openalex.org/W99938045","https://openalex.org/W1493013374","https://openalex.org/W1501386175","https://openalex.org/W1516512945","https://openalex.org/W1542455165","https://openalex.org/W1553849618","https://openalex.org/W1819824216","https://openalex.org/W1870111070","https://openalex.org/W2015179126","https://openalex.org/W2025767538","https://openalex.org/W2053952967","https://openalex.org/W2114473497","https://openalex.org/W2141107613","https://openalex.org/W2151413173","https://openalex.org/W2154807229","https://openalex.org/W2159924820","https://openalex.org/W2162106291","https://openalex.org/W2167606175","https://openalex.org/W2186869461","https://openalex.org/W2198705846","https://openalex.org/W2402310410","https://openalex.org/W2406595422","https://openalex.org/W2527605658","https://openalex.org/W2897151058","https://openalex.org/W2949369157","https://openalex.org/W2950259505","https://openalex.org/W2963067893","https://openalex.org/W2987687226","https://openalex.org/W3030316740","https://openalex.org/W3103450999","https://openalex.org/W3103632944","https://openalex.org/W4322095736","https://openalex.org/W6638479339","https://openalex.org/W6697342186"],"related_works":["https://openalex.org/W2035312053","https://openalex.org/W2908539414","https://openalex.org/W112987992","https://openalex.org/W4246017188","https://openalex.org/W2234619324","https://openalex.org/W4298846198","https://openalex.org/W358240276","https://openalex.org/W17249245","https://openalex.org/W2398270998","https://openalex.org/W2744220011"],"abstract_inverted_index":{"Backdooring":[0],"cryptographic":[1,9,58,182],"algorithms":[2],"is":[3,30,39,162,213,246,266],"an":[4,178],"indisputable":[5],"taboo":[6],"in":[7,22,26,76,127,274],"the":[8,17,23,44,54,77,128,166,196,203,240,275],"literature":[10],"for":[11,215],"a":[12,107,120,144,192,219,258,269],"good":[13],"reason:":[14],"however":[15],"noble":[16],"intentions,":[18],"backdoors":[19,59,183],"might":[20],"fall":[21],"wrong":[24],"hands,":[25],"which":[27,60,222,265],"case":[28],"security":[29],"completely":[31],"compromised.":[32],"Nonetheless,":[33],"more":[34,36,236],"and":[35,66,83,97,115,134,152,159,207,227],"legislative":[37,198],"pressure":[38],"being":[40],"produced":[41],"to":[42,99,118,149,163,190,195,200,217,234,252,256],"enforce":[43],"use":[45,116,185,232,253],"of":[46,56,111,123,171,180,260],"such":[47,172],"backdoors.":[48],"In":[49],"this":[50],"work":[51],"we":[52,90,105,184],"introduce":[53],"concept":[55],"disposable":[57,108,181,270],"can":[61,140,231],"be":[62,141],"used":[63],"only":[64],"once":[65],"become":[67],"useless":[68,243],"after":[69,244],"that.":[70],"These":[71],"exotic":[72],"primitives":[73,173],"are":[74,92],"impossible":[75],"classical":[78,100,135],"digital":[79],"world":[80],"without":[81],"stateful":[82,124,148],"secure":[84,169],"trusted":[85],"hardware":[86,102,125,137],"support,":[87],"but,":[88],"as":[89,143,273],"show,":[91],"feasible":[93],"assuming":[94],"quantum":[95,132],"computation":[96,133],"access":[98],"stateless":[101,136,150,175],"tokens.":[103,138,176],"Concretely,":[104],"construct":[106],"(single-use)":[109],"version":[110,259],"message":[112],"authentication":[113],"codes,":[114],"them":[117],"derive":[119,257],"black-box":[121],"construction":[122,170],"tokens":[126,151],"above":[129,189,276],"setting":[130],"with":[131,268],"This":[139,161],"viewed":[142],"generic":[145],"transformation":[146],"from":[147,174],"enables,":[153],"among":[154],"other":[155],"things,":[156],"one-time":[157,220],"programs":[158],"memories.":[160],"our":[164,186,254],"knowledge":[165],"first":[167],"provably":[168],"As":[177],"application":[179],"constructed":[187],"primitive":[188],"propose":[191],"middle-ground":[193],"solution":[194],"recent":[197],"push":[199],"backdoor":[201,221,241],"cryptography:":[202],"conflict":[204],"between":[205],"Apple":[206,216,230],"FBI.":[208],"We":[209,248],"show":[210],"that":[211],"it":[212,233,245],"possible":[214],"create":[218],"unlocks":[223],"any":[224],"single":[225],"device,":[226],"not":[228],"even":[229],"unlock":[235],"than":[237],"one,":[238],"i.e.,":[239],"becomes":[242],"used.":[247],"further":[249],"describe":[250],"how":[251],"ideas":[255],"CCA-secure":[261],"public":[262],"key":[263],"encryption,":[264],"accompanied":[267],"(i.e.,":[271],"single-use,":[272],"scenario)":[277],"backdoor.":[278]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
