{"id":"https://openalex.org/W398241768","doi":"https://doi.org/10.1007/978-3-642-33272-2_3","title":"Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature","display_name":"Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W398241768","doi":"https://doi.org/10.1007/978-3-642-33272-2_3","mag":"398241768"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-33272-2_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-33272-2_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014482178","display_name":"Shengke Zeng","orcid":"https://orcid.org/0000-0003-2004-9197"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengke Zeng","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","University of Electronic Science and Technology of China, Chendu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chendu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026153335","display_name":"Qing L\u00fc","orcid":"https://orcid.org/0000-0001-5350-776X"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Lu","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088970471","display_name":"Qinyi Li","orcid":"https://orcid.org/0000-0002-5146-5831"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinyi Li","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014482178"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I4210126530"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3172,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57573401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.8695968389511108},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7677321434020996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7414788007736206},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6571433544158936},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6504538059234619},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5928208231925964},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5587723255157471},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5269525647163391},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5226742625236511},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.4433022141456604},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4399870038032532},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.43789228796958923},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4345088601112366},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.43212565779685974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4156118631362915},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.3827214241027832},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.28046470880508423},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24836379289627075},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1983667016029358}],"concepts":[{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.8695968389511108},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7677321434020996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7414788007736206},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6571433544158936},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6504538059234619},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5928208231925964},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5587723255157471},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5269525647163391},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5226742625236511},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.4433022141456604},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4399870038032532},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.43789228796958923},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4345088601112366},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.43212565779685974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4156118631362915},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.3827214241027832},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28046470880508423},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24836379289627075},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1983667016029358},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-33272-2_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-33272-2_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W118934982","https://openalex.org/W1484668983","https://openalex.org/W1506292197","https://openalex.org/W1589421353","https://openalex.org/W1590713339","https://openalex.org/W1689208167","https://openalex.org/W1798609567","https://openalex.org/W1828411905","https://openalex.org/W2002930326","https://openalex.org/W2117797270","https://openalex.org/W2125808633","https://openalex.org/W2129483619","https://openalex.org/W2141395382","https://openalex.org/W2475397807","https://openalex.org/W2481712540","https://openalex.org/W2489926370","https://openalex.org/W2498149115","https://openalex.org/W2503837195","https://openalex.org/W2505860479","https://openalex.org/W2619633776","https://openalex.org/W2624923838","https://openalex.org/W2911424200","https://openalex.org/W4205092462","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1565842368","https://openalex.org/W2380360916","https://openalex.org/W2365660779","https://openalex.org/W834668912","https://openalex.org/W2126213311","https://openalex.org/W2373455563","https://openalex.org/W2379490007","https://openalex.org/W2002679629","https://openalex.org/W2364627624","https://openalex.org/W2022848027"],"abstract_inverted_index":null,"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
