{"id":"https://openalex.org/W4400349660","doi":"https://doi.org/10.3390/cryptography8030029","title":"Public Key Protocols from Twisted-Skew Group Rings","display_name":"Public Key Protocols from Twisted-Skew Group Rings","publication_year":2024,"publication_date":"2024-07-05","ids":{"openalex":"https://openalex.org/W4400349660","doi":"https://doi.org/10.3390/cryptography8030029"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030029","pdf_url":"https://www.mdpi.com/2410-387X/8/3/29/pdf?version=1721189419","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/3/29/pdf?version=1721189419","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026578609","display_name":"Javier de la Cruz","orcid":"https://orcid.org/0000-0003-3609-9148"},"institutions":[{"id":"https://openalex.org/I142879360","display_name":"Universidad del Norte","ror":"https://ror.org/031e6xm45","country_code":"CO","type":"education","lineage":["https://openalex.org/I142879360"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Javier de la Cruz","raw_affiliation_strings":["Department of Mathematics and Statistics, Universidad del Norte, Barranquilla 081007, Colombia"],"raw_orcid":"https://orcid.org/0000-0003-3609-9148","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Statistics, Universidad del Norte, Barranquilla 081007, Colombia","institution_ids":["https://openalex.org/I142879360"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046113278","display_name":"Edgar Mart\u0131\u0301nez-Moro","orcid":"https://orcid.org/0000-0003-1243-2049"},"institutions":[{"id":"https://openalex.org/I108103353","display_name":"Universidad de Valladolid","ror":"https://ror.org/01fvbaw18","country_code":"ES","type":"education","lineage":["https://openalex.org/I108103353"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Edgar Mart\u00ednez-Moro","raw_affiliation_strings":["Institute of Mathematics, Universidad de Valladolid, 47011 Valladolid, Spain"],"raw_orcid":"https://orcid.org/0000-0003-1243-2049","affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Universidad de Valladolid, 47011 Valladolid, Spain","institution_ids":["https://openalex.org/I108103353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100021565","display_name":"Steven Mu\u00f1oz-Ruiz","orcid":null},"institutions":[{"id":"https://openalex.org/I145608581","display_name":"University of Miami","ror":"https://ror.org/02dgjyy92","country_code":"US","type":"education","lineage":["https://openalex.org/I145608581"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven Mu\u00f1oz-Ruiz","raw_affiliation_strings":["Department of Mathematics, University of Miami, Coral Gables, FL 33146, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, University of Miami, Coral Gables, FL 33146, USA","institution_ids":["https://openalex.org/I145608581"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065022234","display_name":"Ricardo Villanueva-Polanco","orcid":"https://orcid.org/0000-0002-8682-4830"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ricardo Villanueva-Polanco","raw_affiliation_strings":["Cryptography Research Center, Technology Innovation Institute, Abu Dhabi P.O. Box 9639, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0002-8682-4830","affiliations":[{"raw_affiliation_string":"Cryptography Research Center, Technology Innovation Institute, Abu Dhabi P.O. Box 9639, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026578609"],"corresponding_institution_ids":["https://openalex.org/I142879360"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.3311,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63421551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"3","first_page":"29","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6528297662734985},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6283058524131775},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6273019313812256},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5777454972267151},{"id":"https://openalex.org/keywords/skew","display_name":"Skew","score":0.5776728987693787},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.574130117893219},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5627874135971069},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5626632571220398},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5488527417182922},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5106967091560364},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.47898125648498535},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4510924816131592},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.43973207473754883},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43515151739120483},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4344390332698822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27829110622406006},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11236438155174255},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.060275882482528687}],"concepts":[{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6528297662734985},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6283058524131775},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6273019313812256},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5777454972267151},{"id":"https://openalex.org/C43711488","wikidata":"https://www.wikidata.org/wiki/Q7534783","display_name":"Skew","level":2,"score":0.5776728987693787},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.574130117893219},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5627874135971069},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5626632571220398},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5488527417182922},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5106967091560364},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.47898125648498535},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4510924816131592},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.43973207473754883},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43515151739120483},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4344390332698822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27829110622406006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11236438155174255},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.060275882482528687},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography8030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030029","pdf_url":"https://www.mdpi.com/2410-387X/8/3/29/pdf?version=1721189419","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:uvadoc.uva.es:10324/70094","is_oa":true,"landing_page_url":"https://uvadoc.uva.es/handle/10324/70094","pdf_url":"https://uvadoc.uva.es/bitstream/10324/70094/1/Public-Key-Protocols.pdf","source":{"id":"https://openalex.org/S4306401553","display_name":"UVaDOC UVaDOC University of Valladolid Documentary Repository (University of Valladolid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I108103353","host_organization_name":"Universidad de Valladolid","host_organization_lineage":["https://openalex.org/I108103353"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:5363a09b1a3a412dac126a0abf2b8a8f","is_oa":true,"landing_page_url":"https://doaj.org/article/5363a09b1a3a412dac126a0abf2b8a8f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 3, p 29 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030029","pdf_url":"https://www.mdpi.com/2410-387X/8/3/29/pdf?version=1721189419","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.550000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400349660.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W768490297","https://openalex.org/W1534388293","https://openalex.org/W2104748480","https://openalex.org/W2131123432","https://openalex.org/W2146650795","https://openalex.org/W2156186849","https://openalex.org/W2610863760","https://openalex.org/W2770684288","https://openalex.org/W2917445968","https://openalex.org/W2963181904","https://openalex.org/W2963939559","https://openalex.org/W2965989741","https://openalex.org/W3021741416","https://openalex.org/W3169477034","https://openalex.org/W4229514166","https://openalex.org/W4281392199","https://openalex.org/W4285191651","https://openalex.org/W4285713342","https://openalex.org/W4291171924","https://openalex.org/W4296241763","https://openalex.org/W4385805359","https://openalex.org/W4392381760","https://openalex.org/W4398233521"],"related_works":["https://openalex.org/W2610867406","https://openalex.org/W1604247182","https://openalex.org/W2018919770","https://openalex.org/W3024131352","https://openalex.org/W39105712","https://openalex.org/W2068471463","https://openalex.org/W2580748008","https://openalex.org/W1987780107","https://openalex.org/W221728233","https://openalex.org/W2765998650"],"abstract_inverted_index":{"This":[0],"article":[1],"studies":[2],"some":[3,21],"algebraic":[4,44,127],"structures":[5,26],"known":[6],"as":[7,41,65],"twisted-skew":[8,32],"group":[9,33,79],"rings":[10,34],"in":[11],"the":[12,42],"context":[13],"of":[14],"public":[15,89,111],"key":[16,90,95],"cryptography.":[17],"We":[18,50,82],"first":[19,68],"present":[20],"background":[22],"related":[23,126],"to":[24,27,38,46,56,77,85,109],"these":[25,58],"then":[28,74,83],"specifically":[29],"introduce":[30,69,99],"particular":[31],"and":[35,73,129],"show":[36],"how":[37],"utilize":[39],"them":[40],"underlying":[43],"structure":[45],"build":[47],"cryptographic":[48,122],"protocols.":[49],"closely":[51],"follow":[52],"an":[53,116],"incremental-like":[54],"methodology":[55],"construct":[57,86],"protocols":[59],"by":[60],"putting":[61],"parts":[62],"together.":[63],"As":[64],"result,":[66],"we":[67,114],"a":[70,78,87,100,104,131],"key-agreement":[71,80],"protocol":[72],"generalize":[75],"it":[76],"protocol.":[81],"proceed":[84],"probabilistic":[88,110],"encryption":[91],"from":[92,103],"our":[93],"two-party":[94],"agreement":[96],"and,":[97],"finally,":[98],"key-encapsulation":[101],"mechanism":[102],"well-known":[105],"generic":[106],"construction":[107,123],"applied":[108],"encryption.":[112],"Furthermore,":[113],"provide":[115],"in-depth":[117],"security":[118],"analysis":[119],"for":[120,134],"each":[121],"under":[124],"new":[125],"assumptions":[128],"supply":[130],"proof-of-concept":[132],"implementation":[133],"various":[135],"candidate":[136],"chosen":[137],"groups.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2024-07-06T00:00:00"}
