{"id":"https://openalex.org/W1965158396","doi":"https://doi.org/10.1080/15501320802520639","title":"Designated-Verifier Chameleon Proxy Signature","display_name":"Designated-Verifier Chameleon Proxy Signature","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W1965158396","doi":"https://doi.org/10.1080/15501320802520639","mag":"1965158396"},"language":"en","primary_location":{"id":"doi:10.1080/15501320802520639","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15501320802520639","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/3f20c8bbb324488cb2e19bf0fcc6793a","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061084006","display_name":"Cheng Ji","orcid":"https://orcid.org/0000-0002-2525-8070"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Ji","raw_affiliation_strings":["North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048996500","display_name":"Qin Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Geng","raw_affiliation_strings":["North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100662562"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05580346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"1","first_page":"29","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9595000147819519,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9300000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8143776655197144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7787715792655945},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.6995000243186951},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.692121148109436},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5383061170578003},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5346395373344421},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5059279799461365},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.4962766766548157},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.4961758553981781},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4893161952495575},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.47203341126441956},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.47168996930122375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4376310408115387},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.42131441831588745},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.4137570261955261},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1357346475124359},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12875708937644958}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8143776655197144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7787715792655945},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.6995000243186951},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.692121148109436},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5383061170578003},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5346395373344421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5059279799461365},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.4962766766548157},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.4961758553981781},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4893161952495575},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.47203341126441956},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.47168996930122375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4376310408115387},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.42131441831588745},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.4137570261955261},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1357346475124359},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12875708937644958}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1080/15501320802520639","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15501320802520639","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:5:y:2009:i:1:p:29-29","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1080/15501320802520639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:3f20c8bbb324488cb2e19bf0fcc6793a","is_oa":true,"landing_page_url":"https://doaj.org/article/3f20c8bbb324488cb2e19bf0fcc6793a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 5, Iss 1, Pp 29-29 (2009)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:3f20c8bbb324488cb2e19bf0fcc6793a","is_oa":true,"landing_page_url":"https://doaj.org/article/3f20c8bbb324488cb2e19bf0fcc6793a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 5, Iss 1, Pp 29-29 (2009)","raw_type":"article"},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2363288909","https://openalex.org/W2606299826","https://openalex.org/W2385375699","https://openalex.org/W1497176106","https://openalex.org/W2356413915","https://openalex.org/W140041957","https://openalex.org/W2151288616","https://openalex.org/W2154896321","https://openalex.org/W2804832731","https://openalex.org/W2261731833"],"abstract_inverted_index":{"With":[0],"the":[1,6,9,13,15,18,74,81,90,102,108,112,116,119,130,133,159,162,171,182,196,227,236,254,269,278,282,288,291,296,299],"development":[2],"of":[3,8,20,73,115,118,132,161,173,229,256,290,298,317],"computer":[4],"technology,":[5],"requirement":[7],"methods":[10,30],"to":[11,69,180,241,324],"verify":[12,287],"authenticity,":[14],"validity,":[16],"and":[17,41,52,80,147,201,260,336],"integrity":[19],"information":[21],"is":[22,46,96,123,206,214,223,266,308,322,334],"becoming":[23],"much":[24],"bigger.":[25],"For":[26],"this":[27],"purpose,":[28],"many":[29,60],"have":[31],"been":[32],"generated,":[33],"such":[34],"as":[35],"digital":[36,38,64],"signature,":[37],"watermarking,":[39],"steganography,":[40],"so":[42],"on.":[43],"Digital":[44],"signature":[45,65,72,83,95,99,122,248,275,292,306],"a":[47,55,67,71,97,124,142,149,174,243],"hot":[48],"topic":[49],"in":[50,59,106,199,268,310],"cryptography":[51],"it":[53],"plays":[54],"very":[56,125],"important":[57],"role":[58],"fields.":[61],"A":[62],"normal":[63,163],"allows":[66],"signer":[68],"generate":[70],"message":[75],"with":[76,89],"his":[77],"secret":[78,184,284],"key":[79,176,285],"generated":[82],"can":[84,286],"be":[85],"verified":[86],"by":[87,137],"anyone":[88],"signer's":[91],"public":[92,175],"key.":[93,185],"Chameleon":[94],"non-interactive":[98],"based":[100,225],"on":[101,226],"well-established":[103],"hash-and-sign":[104],"paradigm,":[105],"which":[107,293],"receiver":[109,279],"cannot":[110],"convince":[111],"third":[113],"party":[114],"identity":[117],"signer.":[120],"Designated-verifier":[121],"useful":[126],"tool":[127],"for":[128],"protecting":[129],"privacy":[131],"valid":[134],"verifier.":[135,300],"Motivated":[136],"above":[138],"statements,":[139],"we":[140,217,234,252],"construct":[141,148],"new":[143,150,190],"chameleon":[144,154,164,191,203,220,238,246],"hash":[145,155,165,169,192,204,221,239],"scheme":[146,156,193,205,222,259,265,307,321,333],"DVICPS":[151,258,264,320,332],"scheme.":[152,250],"Our":[153],"satisfies":[157,194],"all":[158,195],"properties":[160],"function.":[166],"In":[167,273],"our":[168,189,202,219,257,263,274,305,319,331],"function":[170,240],"owner":[172],"does":[177],"not":[178],"need":[179],"retrieve":[181],"associated":[183],"We":[186,301],"prove":[187,261,303],"that":[188,262,304],"attributes":[197],"defined":[198],"[1]":[200],"secure":[207,224,267,309,335],"assuming":[208],"Weak":[209],"Computational":[210,326],"Diffie-Hellman":[211,327],"(WCDH)":[212],"assumption":[213],"difficult.":[215],"And":[216],"show":[218],"difficulty":[228],"solving":[230,325],"WCDHP":[231],"assumption.":[232],"Moreover,":[233],"use":[235],"proposed":[237],"design":[242],"designated-verifier":[244],"ID-based":[245],"proxy":[247],"(DVICPS)":[249],"Furthermore,":[251],"analyze":[253],"security":[255],"random":[270,311],"oracle":[271,312],"model.":[272,313],"scheme,":[276],"only":[277],"who":[280],"owns":[281],"corresponding":[283],"validity":[289],"efficiently":[294],"protects":[295],"benefit":[297],"also":[302],"The":[314],"success":[315],"probability":[316],"forging":[318],"equivalent":[323],"Problem":[328],"(CDHP).":[329],"Thus,":[330],"efficient.":[337]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
