{"id":"https://openalex.org/W1556480499","doi":"https://doi.org/10.1007/978-3-540-85886-7_20","title":"Certificate-Based Signature Schemes without Pairings or Random Oracles","display_name":"Certificate-Based Signature Schemes without Pairings or Random Oracles","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1556480499","doi":"https://doi.org/10.1007/978-3-540-85886-7_20","mag":"1556480499"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-85886-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-85886-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","Cryptography & Security Dept., Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Cryptography & Security Dept., Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","Cryptography & Security Dept., Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Cryptography & Security Dept., Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Australia","Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008266220","display_name":"Jianying Zhou","orcid":"https://orcid.org/0000-0003-0594-0432"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jianying Zhou","raw_affiliation_strings":["Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","Cryptography & Security Dept., Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography and Security Department Institute for Infocomm Research, \u00a0, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Cryptography & Security Dept., Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023687478"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":5.5768,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.96526749,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"285","last_page":"297"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9388999938964844,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9126563668251038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8425148725509644},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.7428101301193237},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.6142966151237488},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.6111487746238708},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.589931845664978},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5857527256011963},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5801411271095276},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5070598125457764},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.4981706142425537},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4149410128593445},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40319526195526123},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3448750972747803},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.26335716247558594},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2301759123802185},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16742590069770813},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13167965412139893},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11778393387794495}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9126563668251038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8425148725509644},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.7428101301193237},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.6142966151237488},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.6111487746238708},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.589931845664978},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5857527256011963},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5801411271095276},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5070598125457764},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.4981706142425537},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4149410128593445},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40319526195526123},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3448750972747803},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.26335716247558594},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2301759123802185},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16742590069770813},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13167965412139893},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11778393387794495},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-85886-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-85886-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1501670540","https://openalex.org/W1542057243","https://openalex.org/W1547928704","https://openalex.org/W1556480499","https://openalex.org/W1559628144","https://openalex.org/W1568514840","https://openalex.org/W1569083856","https://openalex.org/W1574149717","https://openalex.org/W1590902397","https://openalex.org/W1591524234","https://openalex.org/W1592092778","https://openalex.org/W1600495091","https://openalex.org/W1925483862","https://openalex.org/W2056442302","https://openalex.org/W2067809562","https://openalex.org/W2086042811","https://openalex.org/W2152924492","https://openalex.org/W2561675875","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2357912800","https://openalex.org/W2354840055","https://openalex.org/W1526844866","https://openalex.org/W2038033376","https://openalex.org/W2610688825","https://openalex.org/W2089800851","https://openalex.org/W2022961789","https://openalex.org/W2613410895","https://openalex.org/W110748487","https://openalex.org/W2048562664"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
