{"id":"https://openalex.org/W4309634071","doi":"https://doi.org/10.1007/s11432-021-3378-3","title":"DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection","display_name":"DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection","publication_year":2022,"publication_date":"2022-11-14","ids":{"openalex":"https://openalex.org/W4309634071","doi":"https://doi.org/10.1007/s11432-021-3378-3"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-021-3378-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-021-3378-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047910167","display_name":"Axin Xiang","orcid":"https://orcid.org/0000-0002-3404-5341"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Axin Xiang","raw_affiliation_strings":["College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","Institute of Cryptography and Data Security, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Institute of Cryptography and Data Security, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102429252","display_name":"Hongfeng Gao","orcid":"https://orcid.org/0009-0007-5028-6843"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongfeng Gao","raw_affiliation_strings":["College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","Network and Information Management Center, Guizhou University, Guiyang, 550025, China","State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Network and Information Management Center, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147","https://openalex.org/I4210116001"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","Institute of Cryptography and Data Security, Guizhou University, Guiyang, 550025, China","State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Institute of Cryptography and Data Security, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072988320","display_name":"Liang Wan","orcid":"https://orcid.org/0000-0002-7677-8471"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Wan","raw_affiliation_strings":["College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","Institute of Computer Software and Theory, Guizhou University, Guiyang, 550025, China","State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Institute of Computer Software and Theory, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147","https://openalex.org/I4210116001"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047910167"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":1.5157,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86737023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"66","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9011952877044678},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7378488183021545},{"id":"https://openalex.org/keywords/escrow","display_name":"Escrow","score":0.737238347530365},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6069563031196594},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5882254242897034},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5744369626045227},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5327720046043396},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5001602172851562},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1878214180469513},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.052091360092163086},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0495971143245697}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9011952877044678},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7378488183021545},{"id":"https://openalex.org/C167254554","wikidata":"https://www.wikidata.org/wiki/Q338451","display_name":"Escrow","level":2,"score":0.737238347530365},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6069563031196594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5882254242897034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5744369626045227},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5327720046043396},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5001602172851562},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1878214180469513},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.052091360092163086},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0495971143245697}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11432-021-3378-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-021-3378-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2918108318","https://openalex.org/W2920283820"],"related_works":["https://openalex.org/W2358705460","https://openalex.org/W2350245913","https://openalex.org/W2524274420","https://openalex.org/W2111271832","https://openalex.org/W2391501929","https://openalex.org/W2382515391","https://openalex.org/W1859964688","https://openalex.org/W2228077884","https://openalex.org/W1608342435","https://openalex.org/W3131962950"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
