{"id":"https://openalex.org/W4385944018","doi":"https://doi.org/10.1093/comjnl/bxad068","title":"eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data","display_name":"eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data","publication_year":2023,"publication_date":"2023-07-22","ids":{"openalex":"https://openalex.org/W4385944018","doi":"https://doi.org/10.1093/comjnl/bxad068"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxad068","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1093/comjnl/bxad068","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028895887","display_name":"Lingyun Li","orcid":null},"institutions":[{"id":"https://openalex.org/I196934937","display_name":"Liaocheng University","ror":"https://ror.org/03yh0n709","country_code":"CN","type":"education","lineage":["https://openalex.org/I196934937"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingyun Li","raw_affiliation_strings":["School of Computer Science , Liaocheng University, No. 1, Hunan Road, Dongchangfu District, 252059 Liaocheng , China","School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science , Liaocheng University, No. 1, Hunan Road, Dongchangfu District, 252059 Liaocheng , China","institution_ids":["https://openalex.org/I196934937"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007991015","display_name":"Xianhui Lu","orcid":"https://orcid.org/0000-0001-7091-5810"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianhui Lu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065675247","display_name":"Kunpeng Wang","orcid":"https://orcid.org/0000-0002-3848-6419"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunpeng Wang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 19 Yuquan Road, Shijingshan District, 100049 Beijing , China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences , No. 89 Minzhuang Road, Haidian District, 100093 Beijing , China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028895887"],"corresponding_institution_ids":["https://openalex.org/I196934937","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.1228,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.40392593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"67","issue":"4","first_page":"1405","last_page":"1424"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7880687117576599},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765891551971436},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.6536325216293335},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.5532495379447937},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4879879355430603},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.47333863377571106},{"id":"https://openalex.org/keywords/hash-tree","display_name":"Hash tree","score":0.4493480324745178},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.40942853689193726},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.37574875354766846},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3557928204536438},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3279789090156555},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.20929130911827087},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1697533130645752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1670476794242859}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7880687117576599},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765891551971436},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.6536325216293335},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.5532495379447937},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4879879355430603},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.47333863377571106},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.4493480324745178},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.40942853689193726},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.37574875354766846},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3557928204536438},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3279789090156555},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.20929130911827087},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1697533130645752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1670476794242859},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxad068","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1093/comjnl/bxad068","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1160316769","display_name":null,"funder_award_id":"61972391","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W33646188","https://openalex.org/W229578664","https://openalex.org/W1512933114","https://openalex.org/W1600113341","https://openalex.org/W1917159157","https://openalex.org/W1959936891","https://openalex.org/W2006226307","https://openalex.org/W2035447115","https://openalex.org/W2108834246","https://openalex.org/W2131489800","https://openalex.org/W2137147061","https://openalex.org/W2155589547","https://openalex.org/W2793591899","https://openalex.org/W2943732013","https://openalex.org/W2943740952","https://openalex.org/W3038067977","https://openalex.org/W3039552148","https://openalex.org/W3112746517","https://openalex.org/W3129202659","https://openalex.org/W3184797151","https://openalex.org/W4214950786","https://openalex.org/W4225986291","https://openalex.org/W4232836212","https://openalex.org/W4283758659","https://openalex.org/W4297991408","https://openalex.org/W4301373941","https://openalex.org/W6601353047"],"related_works":["https://openalex.org/W3200613697","https://openalex.org/W2186208389","https://openalex.org/W2794923097","https://openalex.org/W1485767353","https://openalex.org/W2479669449","https://openalex.org/W1501275988","https://openalex.org/W2145932317","https://openalex.org/W3150176328","https://openalex.org/W1971082565","https://openalex.org/W2982222368"],"abstract_inverted_index":{"Abstract":[0],"We":[1,291],"present":[2],"eBiBa":[3,128,295],"(enhanced":[4],"BiBa),":[5],"a":[6,23,37,68,101,109,130,151,169,219,230,260,274],"hash-based":[7,190],"signature":[8,14,146,166,178,182,191,195,214,245,257,267],"scheme":[9,28,183],"with":[10,192,236],"the":[11,33,62,79,92,114,159,165,180,188,193,204,213,224,237,244,250,255,266,270],"smallest":[12,194],"possible":[13],"size,":[15],"while":[16,47],"ensuring":[17,48],"high":[18],"feasibility":[19],"and":[20,51,77,145,300],"security":[21],"in":[22,139,142,202,234,259,269],"specific":[24,102,231],"application":[25],"model.":[26],"Our":[27,263],"is":[29,186],"tailored":[30],"to":[31,71,85,107,129,155,217,241,253,279,289],"address":[32],"communication":[34,239],"requirement":[35],"of":[36,89,111,127,134,158,171,277,285],"large-scale":[38],"public":[39,74],"data":[40,49,52],"stream":[41],"continuously":[42],"disseminated":[43],"between":[44],"two":[45],"participants":[46],"source":[50],"integrity":[53],"authentication.":[54],"To":[55],"achieve":[56,156,254,297],"these":[57],"goals,":[58],"firstly,":[59],"we":[60,99,149,163,174,198,207,228,248],"optimized":[61],"classical":[63],"hash":[64,104,220,225],"tree":[65,221,226],"mode":[66,70],"into":[67],"hybrid":[69,205],"efficiently":[72],"perform":[73],"key":[75,144],"authentication":[76,96,232,251],"eliminate":[78],"need":[80],"for":[81,117,223],"an":[82],"authenticated":[83],"channel":[84],"transmit":[86],"large":[87],"amounts":[88],"data,":[90],"unlike":[91],"initial":[93],"BiBa-based":[94],"broadcast":[95],"protocol.":[97],"Secondly,":[98],"employed":[100,208],"tweakable":[103],"chain":[105],"function":[106,154],"digest":[108],"batch":[110],"messages,":[112],"reducing":[113],"required":[115],"conditions":[116],"post-quantum":[118,298],"existential":[119],"unforgeability":[120],"under":[121],"adaptive":[122],"chosen":[123],"message":[124],"attack":[125],"(EUCMA)":[126],"second-pre-image-resistance-like":[131],"property":[132],"instead":[133],"collision":[135],"resistance.":[136],"This":[137],"results":[138],"reduced":[140],"pre-computation":[141],"both":[143],"generations.":[147],"Thirdly,":[148],"utilized":[150],"forward-secure":[152,157,299],"pseudorandom":[153],"proposed":[160],"scheme.":[161],"Finally,":[162],"minimize":[164,243],"size":[167,196,215,258,268],"through":[168],"series":[170],"procedures.":[172],"Firstly,":[173],"select":[175],"BiBa":[176],"few-time":[177,189],"as":[179,287],"underlying":[181],"since":[184],"it":[185],"currently":[187],"that":[197,294],"are":[199],"aware":[200],"of;":[201],"addition,":[203],"approach":[206,252],"can":[209,296],"also":[210,292],"significantly":[211],"reduce":[212],"compared":[216,288],"using":[218],"solely;":[222],"structure,":[227],"design":[229],"path":[233],"combination":[235],"related":[238],"model":[240],"further":[242],"size;":[246],"finally,":[247],"optimize":[249],"minimum":[256],"single":[261],"transmission.":[262],"construction":[264],"minimizes":[265],"aforementioned":[271],"model,":[272],"achieving":[273],"compression":[275],"rate":[276],"0.017":[278],"0.828":[280],"based":[281],"on":[282],"distinct":[283],"values":[284],"parameters,":[286],"XMSS-256.":[290],"demonstrated":[293],"EUCMA":[301],"security.":[302]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
