{"id":"https://openalex.org/W4412598164","doi":"https://doi.org/10.1007/s44443-025-00141-z","title":"DREP-TAP: Dynamic reputation-based threshold anonymous credential protocol","display_name":"DREP-TAP: Dynamic reputation-based threshold anonymous credential protocol","publication_year":2025,"publication_date":"2025-07-23","ids":{"openalex":"https://openalex.org/W4412598164","doi":"https://doi.org/10.1007/s44443-025-00141-z"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00141-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00141-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00141-z.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00141-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000136407","display_name":"Yanshuo Zhang","orcid":"https://orcid.org/0000-0002-5349-6447"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanshuo Zhang","raw_affiliation_strings":["Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107938589","display_name":"Xingyu Zhou","orcid":"https://orcid.org/0009-0009-8877-1857"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyu Zhou","raw_affiliation_strings":["Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006120480","display_name":"Jiayin Kong","orcid":"https://orcid.org/0009-0007-3128-3284"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayin Kong","raw_affiliation_strings":["Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103570246","display_name":"Ying Chen","orcid":"https://orcid.org/0000-0003-3664-3385"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Chen","raw_affiliation_strings":["Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptographic Science and Technology, Beijing Electronic Science & Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101577175","display_name":"Kejun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kejun Zhang","raw_affiliation_strings":["Department of Cyberspace Security, Beijing Electronic Science & Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing Electronic Science & Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000136407"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09078008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.8858337998390198},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5911719799041748},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41878604888916016},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.413359671831131},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3588566780090332},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0986403226852417},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06735885143280029}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.8858337998390198},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5911719799041748},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41878604888916016},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.413359671831131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3588566780090332},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0986403226852417},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06735885143280029},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00141-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00141-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00141-z.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:aa1ba1fa2bed4a9abfb724ffce0e2793","is_oa":true,"landing_page_url":"https://doaj.org/article/aa1ba1fa2bed4a9abfb724ffce0e2793","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 6, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00141-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00141-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00141-z.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7450750546","display_name":null,"funder_award_id":"4232034","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412598164.pdf","grobid_xml":"https://content.openalex.org/works/W4412598164.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W2112876561","https://openalex.org/W2170001900","https://openalex.org/W2885441814","https://openalex.org/W2900301566","https://openalex.org/W2956087047","https://openalex.org/W2968703654","https://openalex.org/W3109364115","https://openalex.org/W3123085760","https://openalex.org/W3129433628","https://openalex.org/W3179292749","https://openalex.org/W3200048863","https://openalex.org/W4205769651","https://openalex.org/W4210539265","https://openalex.org/W4225964838","https://openalex.org/W4285396421","https://openalex.org/W4296132227","https://openalex.org/W4321792652","https://openalex.org/W4327601758","https://openalex.org/W4327748149","https://openalex.org/W4376626805","https://openalex.org/W4378696900","https://openalex.org/W4379472206","https://openalex.org/W4386777633","https://openalex.org/W4388857500","https://openalex.org/W4390754166","https://openalex.org/W4396951901","https://openalex.org/W4399071808","https://openalex.org/W4399202568","https://openalex.org/W4401902884","https://openalex.org/W4403411994","https://openalex.org/W4404449717","https://openalex.org/W4405987240","https://openalex.org/W4406291809","https://openalex.org/W4406428763"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W1986630940","https://openalex.org/W1859642347","https://openalex.org/W3115858616","https://openalex.org/W4392576316"],"abstract_inverted_index":{"The":[0,53,98],"proliferation":[1],"of":[2,11,67,87,95,113,175,205],"networked":[3],"devices,":[4],"driven":[5],"by":[6,64],"advancements":[7],"in":[8,153,172],"the":[9,65,79,84,92,107,111,121,125,150,173,184,198,206],"Internet":[10],"Things":[12],"and":[13,48,70,103,116,131,160,169,186,189,200],"edge":[14],"computing":[15],"technologies,":[16],"has":[17],"introduced":[18],"significant":[19],"challenges":[20],"related":[21],"to":[22,56,83,196],"network":[23],"security.":[24],"To":[25],"address":[26],"this":[27,29],"challenge,":[28],"paper":[30],"proposes":[31],"a":[32],"dynamic":[33,45],"reputation-based":[34],"threshold":[35,43,114],"anonymous":[36],"credential":[37],"protocol,":[38],"which":[39,134],"integrates":[40],"multi-dimensional":[41],"scenario-adaptive":[42],"decision-making,":[44],"reputation":[46,72,193],"assessment,":[47],"efficient":[49],"distributed":[50],"authentication":[51,60,108],"mechanisms.":[52],"protocol's":[54,151],"ability":[55],"dynamically":[57],"adjust":[58],"its":[59],"strategy":[61],"is":[62],"facilitated":[63],"incorporation":[66],"both":[68],"long-term":[69],"short-term":[71],"assessment":[73,194],"models.":[74],"This":[75],"feature":[76],"ensures":[77],"that":[78],"protocol":[80,99,126],"can":[81,127,181],"adapt":[82],"diverse":[85],"characteristics":[86],"user":[88],"behavior,":[89],"thereby":[90],"accommodating":[91],"varied":[93],"requirements":[94,143],"different":[96],"scenarios.":[97],"also":[100],"enhances":[101],"security":[102,130],"fault":[104],"tolerance":[105],"during":[106],"process":[109],"through":[110],"application":[112],"value":[115],"slice":[117],"aggregation":[118],"technology.":[119],"In":[120],"specific":[122],"implementation":[123],"process,":[124],"effectively":[128],"balance":[129],"resource":[132],"efficiency,":[133],"makes":[135],"it":[136,165],"especially":[137],"suitable":[138],"for":[139],"environments":[140],"with":[141],"high-security":[142],"or":[144],"limited":[145],"resources.":[146],"Experimental":[147],"results":[148],"demonstrated":[149],"superiority":[152],"various":[154],"metrics,":[155],"including":[156],"accuracy,":[157],"precision,":[158],"recall,":[159],"other":[161],"performance":[162],"indicators.":[163],"Additionally,":[164],"exhibited":[166],"remarkable":[167],"resilience":[168],"anti-attack":[170],"capabilities":[171,204],"face":[174],"malicious":[176],"attacks.":[177],"Future":[178],"research":[179],"endeavors":[180],"further":[182],"optimize":[183],"computation":[185],"communication":[187],"overheads":[188],"introduce":[190],"more":[191],"complex":[192],"models":[195],"enhance":[197],"real-time":[199],"abnormal":[201],"behavior":[202],"prediction":[203],"system.":[207]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
