{"id":"https://openalex.org/W4366183557","doi":"https://doi.org/10.3390/cryptography7020022","title":"Anonymous Homomorphic IBE with Application to Anonymous Aggregation","display_name":"Anonymous Homomorphic IBE with Application to Anonymous Aggregation","publication_year":2023,"publication_date":"2023-04-17","ids":{"openalex":"https://openalex.org/W4366183557","doi":"https://doi.org/10.3390/cryptography7020022"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7020022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020022","pdf_url":"https://www.mdpi.com/2410-387X/7/2/22/pdf?version=1681719104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/2/22/pdf?version=1681719104","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055103778","display_name":"Michael Clear","orcid":"https://orcid.org/0000-0001-5529-2280"},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Michael Clear","raw_affiliation_strings":["School of Computer Science and Statistics, Trinity College Dublin, D02 PN40 Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Statistics, Trinity College Dublin, D02 PN40 Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058790523","display_name":"Hitesh Tewari","orcid":"https://orcid.org/0000-0003-1738-527X"},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Hitesh Tewari","raw_affiliation_strings":["School of Computer Science and Statistics, Trinity College Dublin, D02 PN40 Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Statistics, Trinity College Dublin, D02 PN40 Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058790523"],"corresponding_institution_ids":["https://openalex.org/I205274468"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0341015,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":"2","first_page":"22","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9645190238952637},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8219770193099976},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.7241691946983337},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6253040432929993},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5978944897651672},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5575846433639526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5468322038650513},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5413967370986938},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5326739549636841},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5315135717391968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44176965951919556},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4301936626434326},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33702602982521057},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3350764811038971},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11160388588905334}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9645190238952637},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8219770193099976},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.7241691946983337},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6253040432929993},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5978944897651672},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5575846433639526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5468322038650513},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5413967370986938},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5326739549636841},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5315135717391968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44176965951919556},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4301936626434326},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33702602982521057},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3350764811038971},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11160388588905334},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7020022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020022","pdf_url":"https://www.mdpi.com/2410-387X/7/2/22/pdf?version=1681719104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fb9f907adf9b4ad19a6891f5f6657485","is_oa":true,"landing_page_url":"https://doaj.org/article/fb9f907adf9b4ad19a6891f5f6657485","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 2, p 22 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7020022","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020022","pdf_url":"https://www.mdpi.com/2410-387X/7/2/22/pdf?version=1681719104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G264021278","display_name":null,"funder_award_id":"13/RC/2077_P2","funder_id":"https://openalex.org/F4320320847","funder_display_name":"Science Foundation Ireland"},{"id":"https://openalex.org/G6334448832","display_name":null,"funder_award_id":"13/RC/2106_P2","funder_id":"https://openalex.org/F4320320847","funder_display_name":"Science Foundation Ireland"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4366183557.pdf","grobid_xml":"https://content.openalex.org/works/W4366183557.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W12378221","https://openalex.org/W1499407211","https://openalex.org/W1504029287","https://openalex.org/W1532946854","https://openalex.org/W1534388293","https://openalex.org/W1535295077","https://openalex.org/W1797206029","https://openalex.org/W2040617428","https://openalex.org/W2054904172","https://openalex.org/W2108834246","https://openalex.org/W2132089379","https://openalex.org/W2168532569","https://openalex.org/W2292972144","https://openalex.org/W2919068010","https://openalex.org/W3100960533"],"related_works":["https://openalex.org/W2031533839","https://openalex.org/W2373807270","https://openalex.org/W2463324981","https://openalex.org/W1857520831","https://openalex.org/W3149282150","https://openalex.org/W3030101758","https://openalex.org/W2898713535","https://openalex.org/W2949567201","https://openalex.org/W1546774120","https://openalex.org/W2395027775"],"abstract_inverted_index":{"All":[0],"anonymous":[1,38,109,127],"identity-based":[2,126],"encryption":[3,110],"(IBE)":[4],"schemes":[5,65],"that":[6,42,52],"are":[7,62,66],"group":[8],"homomorphic":[9,24,49],"(to":[10],"the":[11,19,23,79,82,96],"best":[12],"of":[13,18,81,98],"our":[14,122],"knowledge)":[15],"require":[16],"knowledge":[17],"identity":[20],"to":[21,35,47,102,115,124],"compute":[22],"operation.":[25],"This":[26],"paper":[27],"is":[28],"motivated":[29],"by":[30,75],"this":[31,72],"open":[32,73],"problem,":[33],"namely":[34],"construct":[36,103,125],"an":[37,104],"group-homomorphic":[39],"IBE":[40,105],"scheme":[41,101,106],"does":[43],"not":[44],"sacrifice":[45],"anonymity":[46],"perform":[48],"operations.":[50],"Note":[51],"even":[53],"when":[54],"strong":[55],"assumptions,":[56],"such":[57,99],"as":[58],"indistinguishability":[59],"obfuscation":[60],"(iO),":[61],"permitted,":[63],"no":[64],"known.":[67],"We":[68,93],"succeed":[69],"in":[70],"solving":[71],"problem":[74,84],"assuming":[76],"iO":[77],"and":[78],"hardness":[80],"DBDH":[83],"over":[85],"rings":[86],"(specifically,":[87],"ZN2":[88],"for":[89],"RSA":[90],"modulus":[91],"N).":[92],"then":[94],"use":[95,121],"existence":[97],"a":[100],"with":[107],"re-randomizable":[108],"keys,":[111],"which":[112],"we":[113,120],"prove":[114],"be":[116],"IND-ID-RCCA":[117],"secure.":[118],"Finally,":[119],"results":[123],"aggregation":[128],"protocols.":[129]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2023-04-19T00:00:00"}
