AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY Article Swipe
Pankaj Sharma
,
Kritika Gupta
,
Nikhlesh Kumar Badoga
,
Ashima Ashima
,
Himanshu Monga
·
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.6583465
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.6583465
Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a double fold authenticated public key encryption scheme which helps us in securely sending the confidential data between sender and receiver. This scheme makes the encrypted data more secure against various cryptographic attacks
Related Topics
Concepts
Elliptic curve cryptography
Public-key cryptography
Scheme (mathematics)
Computer science
ID-based cryptography
Encryption
Key (lock)
Computer security
Cryptography
Authenticated encryption
Elliptic curve
Mathematics
Key distribution
Pure mathematics
Mathematical analysis
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5281/zenodo.6583465
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4281552546
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4281552546Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.6583465Digital Object Identifier
- Title
-
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-05-26Full publication date if available
- Authors
-
Pankaj Sharma, Kritika Gupta, Nikhlesh Kumar Badoga, Ashima Ashima, Himanshu MongaList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.6583465Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.6583465Direct OA link when available
- Concepts
-
Elliptic curve cryptography, Public-key cryptography, Scheme (mathematics), Computer science, ID-based cryptography, Encryption, Key (lock), Computer security, Cryptography, Authenticated encryption, Elliptic curve, Mathematics, Key distribution, Pure mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4281552546 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.6583465 |
| ids.doi | https://doi.org/10.5281/zenodo.6583465 |
| ids.openalex | https://openalex.org/W4281552546 |
| fwci | 0.0 |
| type | article |
| title | AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.49790000915527344 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C167615521 |
| concepts[0].level | 4 |
| concepts[0].score | 0.6969438195228577 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1048911 |
| concepts[0].display_name | Elliptic curve cryptography |
| concepts[1].id | https://openalex.org/C203062551 |
| concepts[1].level | 3 |
| concepts[1].score | 0.6032741665840149 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[1].display_name | Public-key cryptography |
| concepts[2].id | https://openalex.org/C77618280 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5683802366256714 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[2].display_name | Scheme (mathematics) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.5512663722038269 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C19150895 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5375210046768188 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q582616 |
| concepts[4].display_name | ID-based cryptography |
| concepts[5].id | https://openalex.org/C148730421 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5179980397224426 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[5].display_name | Encryption |
| concepts[6].id | https://openalex.org/C26517878 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5153502821922302 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[6].display_name | Key (lock) |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.47563767433166504 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C178489894 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4552809000015259 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[8].display_name | Cryptography |
| concepts[9].id | https://openalex.org/C128619300 |
| concepts[9].level | 3 |
| concepts[9].score | 0.42702335119247437 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q15263584 |
| concepts[9].display_name | Authenticated encryption |
| concepts[10].id | https://openalex.org/C179603306 |
| concepts[10].level | 2 |
| concepts[10].score | 0.42557328939437866 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q268493 |
| concepts[10].display_name | Elliptic curve |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.2740532159805298 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C160333310 |
| concepts[12].level | 4 |
| concepts[12].score | 0.17064505815505981 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q6398153 |
| concepts[12].display_name | Key distribution |
| concepts[13].id | https://openalex.org/C202444582 |
| concepts[13].level | 1 |
| concepts[13].score | 0.06371626257896423 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[13].display_name | Pure mathematics |
| concepts[14].id | https://openalex.org/C134306372 |
| concepts[14].level | 1 |
| concepts[14].score | 0.05257955193519592 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[14].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/elliptic-curve-cryptography |
| keywords[0].score | 0.6969438195228577 |
| keywords[0].display_name | Elliptic curve cryptography |
| keywords[1].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[1].score | 0.6032741665840149 |
| keywords[1].display_name | Public-key cryptography |
| keywords[2].id | https://openalex.org/keywords/scheme |
| keywords[2].score | 0.5683802366256714 |
| keywords[2].display_name | Scheme (mathematics) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.5512663722038269 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/id-based-cryptography |
| keywords[4].score | 0.5375210046768188 |
| keywords[4].display_name | ID-based cryptography |
| keywords[5].id | https://openalex.org/keywords/encryption |
| keywords[5].score | 0.5179980397224426 |
| keywords[5].display_name | Encryption |
| keywords[6].id | https://openalex.org/keywords/key |
| keywords[6].score | 0.5153502821922302 |
| keywords[6].display_name | Key (lock) |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.47563767433166504 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/cryptography |
| keywords[8].score | 0.4552809000015259 |
| keywords[8].display_name | Cryptography |
| keywords[9].id | https://openalex.org/keywords/authenticated-encryption |
| keywords[9].score | 0.42702335119247437 |
| keywords[9].display_name | Authenticated encryption |
| keywords[10].id | https://openalex.org/keywords/elliptic-curve |
| keywords[10].score | 0.42557328939437866 |
| keywords[10].display_name | Elliptic curve |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.2740532159805298 |
| keywords[11].display_name | Mathematics |
| keywords[12].id | https://openalex.org/keywords/key-distribution |
| keywords[12].score | 0.17064505815505981 |
| keywords[12].display_name | Key distribution |
| keywords[13].id | https://openalex.org/keywords/pure-mathematics |
| keywords[13].score | 0.06371626257896423 |
| keywords[13].display_name | Pure mathematics |
| keywords[14].id | https://openalex.org/keywords/mathematical-analysis |
| keywords[14].score | 0.05257955193519592 |
| keywords[14].display_name | Mathematical analysis |
| language | en |
| locations[0].id | doi:10.5281/zenodo.6583465 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article-journal |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.6583465 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A5079702568 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-6073-3837 |
| authorships[0].author.display_name | Pankaj Sharma |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I904467727 |
| authorships[0].affiliations[0].raw_affiliation_string | Himachal Pradesh University |
| authorships[0].institutions[0].id | https://openalex.org/I904467727 |
| authorships[0].institutions[0].ror | https://ror.org/02s5yma07 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I904467727 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Himachal Pradesh University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | P. L. Sharma |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Himachal Pradesh University |
| authorships[1].author.id | https://openalex.org/A5101672427 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5524-2483 |
| authorships[1].author.display_name | Kritika Gupta |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I904467727 |
| authorships[1].affiliations[0].raw_affiliation_string | Himachal Pradesh University |
| authorships[1].institutions[0].id | https://openalex.org/I904467727 |
| authorships[1].institutions[0].ror | https://ror.org/02s5yma07 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I904467727 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Himachal Pradesh University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Kritika Gupta |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Himachal Pradesh University |
| authorships[2].author.id | https://openalex.org/A5083099294 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Nikhlesh Kumar Badoga |
| authorships[2].affiliations[0].raw_affiliation_string | Jwaharlal Nehru Government Engineering College |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Nikhlesh Kumar Badoga |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Jwaharlal Nehru Government Engineering College |
| authorships[3].author.id | https://openalex.org/A5102846340 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Ashima Ashima |
| authorships[3].affiliations[0].raw_affiliation_string | Jwaharlal Nehru Government Engineering College |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Ashima |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Jwaharlal Nehru Government Engineering College |
| authorships[4].author.id | https://openalex.org/A5052396175 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-7628-4917 |
| authorships[4].author.display_name | Himanshu Monga |
| authorships[4].affiliations[0].raw_affiliation_string | Jwaharlal Nehru Government Engineering College |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Himanshu Monga |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Jwaharlal Nehru Government Engineering College |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.6583465 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.49790000915527344 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2532235922, https://openalex.org/W4226476440, https://openalex.org/W2031177322, https://openalex.org/W2184396328, https://openalex.org/W1556944867, https://openalex.org/W2915550258, https://openalex.org/W2164478452, https://openalex.org/W2584223401, https://openalex.org/W2950233671, https://openalex.org/W2235903869 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.6583465 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article-journal |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.6583465 |
| primary_location.id | doi:10.5281/zenodo.6583465 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article-journal |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.6583465 |
| publication_date | 2022-05-26 |
| publication_year | 2022 |
| referenced_works_count | 0 |
| abstract_inverted_index.In | 11 |
| abstract_inverted_index.in | 8, 28 |
| abstract_inverted_index.is | 4 |
| abstract_inverted_index.of | 2, 5 |
| abstract_inverted_index.us | 27 |
| abstract_inverted_index.we | 15 |
| abstract_inverted_index.and | 36 |
| abstract_inverted_index.key | 22 |
| abstract_inverted_index.the | 12, 31, 41 |
| abstract_inverted_index.This | 38 |
| abstract_inverted_index.data | 3, 33, 43 |
| abstract_inverted_index.fold | 19 |
| abstract_inverted_index.more | 44 |
| abstract_inverted_index.a<br> | 17 |
| abstract_inverted_index.helps | 26 |
| abstract_inverted_index.makes | 40 |
| abstract_inverted_index.prime | 6 |
| abstract_inverted_index.which | 25 |
| abstract_inverted_index.Secure | 0 |
| abstract_inverted_index.double | 18 |
| abstract_inverted_index.paper, | 14 |
| abstract_inverted_index.public | 21 |
| abstract_inverted_index.scheme | 24, 39 |
| abstract_inverted_index.secure | 45 |
| abstract_inverted_index.sender | 35 |
| abstract_inverted_index.world. | 10 |
| abstract_inverted_index.against | 46 |
| abstract_inverted_index.attacks | 49 |
| abstract_inverted_index.between | 34 |
| abstract_inverted_index.present | 13 |
| abstract_inverted_index.propose | 16 |
| abstract_inverted_index.sending | 30 |
| abstract_inverted_index.securely | 29 |
| abstract_inverted_index.encrypted | 42 |
| abstract_inverted_index.receiver. | 37 |
| abstract_inverted_index.today’s | 9 |
| abstract_inverted_index.encryption | 23 |
| abstract_inverted_index.importance | 7 |
| abstract_inverted_index.various<br> | 47 |
| abstract_inverted_index.authenticated | 20 |
| abstract_inverted_index.cryptographic | 48 |
| abstract_inverted_index.transformation | 1 |
| abstract_inverted_index.confidential<br> | 32 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.04555801 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |