{"id":"https://openalex.org/W1552041709","doi":"https://doi.org/10.1007/978-3-540-88733-1_7","title":"Optimal Online/Offline Signature: How to Sign a Message without Online Computation","display_name":"Optimal Online/Offline Signature: How to Sign a Message without Online Computation","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1552041709","doi":"https://doi.org/10.1007/978-3-540-88733-1_7","mag":"1552041709"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-88733-1_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88733-1_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051751395","display_name":"Fuchun Guo","orcid":"https://orcid.org/0000-0001-6939-7710"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fuchun Guo","raw_affiliation_strings":["Key Lab of Network Security and Cryptology School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptology School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia NSW 2522#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia NSW 2522#TAB#","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051751395"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.9458,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86167502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.8398399353027344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8276614546775818},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6350657343864441},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.6131856441497803},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.5962356925010681},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.5905582904815674},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.5568404197692871},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.523602306842804},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.5163735151290894},{"id":"https://openalex.org/keywords/online-and-offline","display_name":"Online and offline","score":0.49607619643211365},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4789745807647705},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.47367697954177856},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46146610379219055},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46048909425735474},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4328838288784027},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22032931447029114},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1173960268497467}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.8398399353027344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8276614546775818},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6350657343864441},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.6131856441497803},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.5962356925010681},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.5905582904815674},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.5568404197692871},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.523602306842804},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.5163735151290894},{"id":"https://openalex.org/C2780102126","wikidata":"https://www.wikidata.org/wiki/Q10928179","display_name":"Online and offline","level":2,"score":0.49607619643211365},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4789745807647705},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.47367697954177856},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46146610379219055},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46048909425735474},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4328838288784027},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22032931447029114},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1173960268497467},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-88733-1_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88733-1_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-2854","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/1834","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W15755104","https://openalex.org/W115629558","https://openalex.org/W1495266644","https://openalex.org/W1531217702","https://openalex.org/W1592092778","https://openalex.org/W1610688607","https://openalex.org/W1653866131","https://openalex.org/W1788452017","https://openalex.org/W1919093791","https://openalex.org/W1925483862","https://openalex.org/W2000600617","https://openalex.org/W2099725934","https://openalex.org/W2117685508","https://openalex.org/W2117797270","https://openalex.org/W2129184440","https://openalex.org/W2398073363","https://openalex.org/W2484860292","https://openalex.org/W2490262601","https://openalex.org/W2561675875","https://openalex.org/W2619633776","https://openalex.org/W2624923838","https://openalex.org/W2914841653","https://openalex.org/W3035112273","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2385375699","https://openalex.org/W2804832731","https://openalex.org/W2606299826","https://openalex.org/W2363288909","https://openalex.org/W2261731833","https://openalex.org/W834668912","https://openalex.org/W2100860967","https://openalex.org/W2347733707","https://openalex.org/W2375435031","https://openalex.org/W2166253510"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
