Authenticated Public Key Encryption Scheme using Elliptic Curve Cryptography Article Swipe
P. L. Sharma
,
Kritika Gupta
,
Nikhlesh Kumar Badoga
,
Ashima Ashima
,
Himanshu Monga
·
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5121/iju.2022.13202
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5121/iju.2022.13202
Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a double fold authenticated public key encryption scheme which helps us in securely sending the confidential data between sender and receiver. This scheme makes the encrypted data more secure against various cryptographic attacks
Related Topics
Concepts
Computer science
Encryption
Public-key cryptography
Computer security
Cryptography
Elliptic curve cryptography
Communication source
Scheme (mathematics)
Signcryption
Computer network
Theoretical computer science
Mathematics
Mathematical analysis
Metadata
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.5121/iju.2022.13202
- https://doi.org/10.5121/iju.2022.13202
- OA Status
- diamond
- References
- 14
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4280517785
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4280517785Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5121/iju.2022.13202Digital Object Identifier
- Title
-
Authenticated Public Key Encryption Scheme using Elliptic Curve CryptographyWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-04-30Full publication date if available
- Authors
-
P. L. Sharma, Kritika Gupta, Nikhlesh Kumar Badoga, Ashima Ashima, Himanshu MongaList of authors in order
- Landing page
-
https://doi.org/10.5121/iju.2022.13202Publisher landing page
- PDF URL
-
https://doi.org/10.5121/iju.2022.13202Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5121/iju.2022.13202Direct OA link when available
- Concepts
-
Computer science, Encryption, Public-key cryptography, Computer security, Cryptography, Elliptic curve cryptography, Communication source, Scheme (mathematics), Signcryption, Computer network, Theoretical computer science, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
14Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4280517785 |
|---|---|
| doi | https://doi.org/10.5121/iju.2022.13202 |
| ids.doi | https://doi.org/10.5121/iju.2022.13202 |
| ids.openalex | https://openalex.org/W4280517785 |
| fwci | 0.0 |
| type | article |
| title | Authenticated Public Key Encryption Scheme using Elliptic Curve Cryptography |
| biblio.issue | 2 |
| biblio.volume | 13 |
| biblio.last_page | 31 |
| biblio.first_page | 19 |
| topics[0].id | https://openalex.org/T11693 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9962999820709229 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cryptography and Residue Arithmetic |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9778000116348267 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T10237 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9681000113487244 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptography and Data Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6994194388389587 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148730421 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5705110430717468 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[1].display_name | Encryption |
| concepts[2].id | https://openalex.org/C203062551 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5467078685760498 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[2].display_name | Public-key cryptography |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5328671932220459 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C178489894 |
| concepts[4].level | 2 |
| concepts[4].score | 0.46533361077308655 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[4].display_name | Cryptography |
| concepts[5].id | https://openalex.org/C167615521 |
| concepts[5].level | 4 |
| concepts[5].score | 0.44515687227249146 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1048911 |
| concepts[5].display_name | Elliptic curve cryptography |
| concepts[6].id | https://openalex.org/C198104137 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4349883794784546 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q974688 |
| concepts[6].display_name | Communication source |
| concepts[7].id | https://openalex.org/C77618280 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4295307993888855 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[7].display_name | Scheme (mathematics) |
| concepts[8].id | https://openalex.org/C155527597 |
| concepts[8].level | 4 |
| concepts[8].score | 0.42317306995391846 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1727777 |
| concepts[8].display_name | Signcryption |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.38743364810943604 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C80444323 |
| concepts[10].level | 1 |
| concepts[10].score | 0.3263993263244629 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[10].display_name | Theoretical computer science |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.2081339955329895 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C134306372 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[12].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6994194388389587 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/encryption |
| keywords[1].score | 0.5705110430717468 |
| keywords[1].display_name | Encryption |
| keywords[2].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[2].score | 0.5467078685760498 |
| keywords[2].display_name | Public-key cryptography |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5328671932220459 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/cryptography |
| keywords[4].score | 0.46533361077308655 |
| keywords[4].display_name | Cryptography |
| keywords[5].id | https://openalex.org/keywords/elliptic-curve-cryptography |
| keywords[5].score | 0.44515687227249146 |
| keywords[5].display_name | Elliptic curve cryptography |
| keywords[6].id | https://openalex.org/keywords/communication-source |
| keywords[6].score | 0.4349883794784546 |
| keywords[6].display_name | Communication source |
| keywords[7].id | https://openalex.org/keywords/scheme |
| keywords[7].score | 0.4295307993888855 |
| keywords[7].display_name | Scheme (mathematics) |
| keywords[8].id | https://openalex.org/keywords/signcryption |
| keywords[8].score | 0.42317306995391846 |
| keywords[8].display_name | Signcryption |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.38743364810943604 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[10].score | 0.3263993263244629 |
| keywords[10].display_name | Theoretical computer science |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.2081339955329895 |
| keywords[11].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.5121/iju.2022.13202 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210192348 |
| locations[0].source.issn | 0975-8992, 0976-2213 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0975-8992 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of UbiComp |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.5121/iju.2022.13202 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of UbiComp |
| locations[0].landing_page_url | http://doi.org/10.5121/iju.2022.13202 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5078394092 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | P. L. Sharma |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | P. L. Sharma |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5101672427 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5524-2483 |
| authorships[1].author.display_name | Kritika Gupta |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Kritika Gupta |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5083099294 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Nikhlesh Kumar Badoga |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I904467727 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Mathematics & Statistics, Himachal Pradesh University, Shimla, India |
| authorships[2].affiliations[1].institution_ids | https://openalex.org/I162030827 |
| authorships[2].affiliations[1].raw_affiliation_string | Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India |
| authorships[2].affiliations[2].raw_affiliation_string | Department of Electronics & Communication Engineering Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India |
| authorships[2].institutions[0].id | https://openalex.org/I904467727 |
| authorships[2].institutions[0].ror | https://ror.org/02s5yma07 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I904467727 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Himachal Pradesh University |
| authorships[2].institutions[1].id | https://openalex.org/I162030827 |
| authorships[2].institutions[1].ror | https://ror.org/00wdq3744 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I162030827 |
| authorships[2].institutions[1].country_code | IN |
| authorships[2].institutions[1].display_name | Thapar Institute of Engineering & Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Nikhlesh Kumar Badoga |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India, Department of Electronics & Communication Engineering Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India, Department of Mathematics & Statistics, Himachal Pradesh University, Shimla, India |
| authorships[3].author.id | https://openalex.org/A5102846340 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Ashima Ashima |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | None Ashima |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5052396175 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-7628-4917 |
| authorships[4].author.display_name | Himanshu Monga |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I904467727 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Mathematics & Statistics, Himachal Pradesh University, Shimla, India |
| authorships[4].affiliations[1].raw_affiliation_string | Department of Electronics & Communication Engineering Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India |
| authorships[4].institutions[0].id | https://openalex.org/I904467727 |
| authorships[4].institutions[0].ror | https://ror.org/02s5yma07 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I904467727 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Himachal Pradesh University |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Himanshu Monga |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Electronics & Communication Engineering Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India, Department of Mathematics & Statistics, Himachal Pradesh University, Shimla, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5121/iju.2022.13202 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Authenticated Public Key Encryption Scheme using Elliptic Curve Cryptography |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11693 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9962999820709229 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cryptography and Residue Arithmetic |
| related_works | https://openalex.org/W2150895763, https://openalex.org/W2043038862, https://openalex.org/W2077461987, https://openalex.org/W2390655757, https://openalex.org/W2054497314, https://openalex.org/W2386320400, https://openalex.org/W2352196398, https://openalex.org/W2509683280, https://openalex.org/W2520732311, https://openalex.org/W103887081 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5121/iju.2022.13202 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210192348 |
| best_oa_location.source.issn | 0975-8992, 0976-2213 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0975-8992 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of UbiComp |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.5121/iju.2022.13202 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of UbiComp |
| best_oa_location.landing_page_url | http://doi.org/10.5121/iju.2022.13202 |
| primary_location.id | doi:10.5121/iju.2022.13202 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210192348 |
| primary_location.source.issn | 0975-8992, 0976-2213 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0975-8992 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of UbiComp |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.5121/iju.2022.13202 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of UbiComp |
| primary_location.landing_page_url | http://doi.org/10.5121/iju.2022.13202 |
| publication_date | 2022-04-30 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W6637792554, https://openalex.org/W6610284376, https://openalex.org/W6603865390, https://openalex.org/W2313832737, https://openalex.org/W1547407391, https://openalex.org/W1146431633, https://openalex.org/W2027674657, https://openalex.org/W1998368731, https://openalex.org/W2015588962, https://openalex.org/W2477775364, https://openalex.org/W3041379456, https://openalex.org/W1880212920, https://openalex.org/W4292027090, https://openalex.org/W4246892041 |
| referenced_works_count | 14 |
| abstract_inverted_index.a | 17 |
| abstract_inverted_index.In | 11 |
| abstract_inverted_index.in | 8, 28 |
| abstract_inverted_index.is | 4 |
| abstract_inverted_index.of | 2, 5 |
| abstract_inverted_index.us | 27 |
| abstract_inverted_index.we | 15 |
| abstract_inverted_index.and | 36 |
| abstract_inverted_index.key | 22 |
| abstract_inverted_index.the | 12, 31, 41 |
| abstract_inverted_index.This | 38 |
| abstract_inverted_index.data | 3, 33, 43 |
| abstract_inverted_index.fold | 19 |
| abstract_inverted_index.more | 44 |
| abstract_inverted_index.helps | 26 |
| abstract_inverted_index.makes | 40 |
| abstract_inverted_index.prime | 6 |
| abstract_inverted_index.which | 25 |
| abstract_inverted_index.Secure | 0 |
| abstract_inverted_index.double | 18 |
| abstract_inverted_index.paper, | 14 |
| abstract_inverted_index.public | 21 |
| abstract_inverted_index.scheme | 24, 39 |
| abstract_inverted_index.secure | 45 |
| abstract_inverted_index.sender | 35 |
| abstract_inverted_index.world. | 10 |
| abstract_inverted_index.against | 46 |
| abstract_inverted_index.attacks | 49 |
| abstract_inverted_index.between | 34 |
| abstract_inverted_index.present | 13 |
| abstract_inverted_index.propose | 16 |
| abstract_inverted_index.sending | 30 |
| abstract_inverted_index.various | 47 |
| abstract_inverted_index.securely | 29 |
| abstract_inverted_index.encrypted | 42 |
| abstract_inverted_index.receiver. | 37 |
| abstract_inverted_index.today’s | 9 |
| abstract_inverted_index.encryption | 23 |
| abstract_inverted_index.importance | 7 |
| abstract_inverted_index.confidential | 32 |
| abstract_inverted_index.authenticated | 20 |
| abstract_inverted_index.cryptographic | 48 |
| abstract_inverted_index.transformation | 1 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6700000166893005 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.06111858 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |