{"id":"https://openalex.org/W2797328508","doi":"https://doi.org/10.1093/computer_journal/bxy036","title":"Non-interactive Conditional Proxy Re-Signature in the Standard Model","display_name":"Non-interactive Conditional Proxy Re-Signature in the Standard Model","publication_year":2018,"publication_date":"2018-04-10","ids":{"openalex":"https://openalex.org/W2797328508","doi":"https://doi.org/10.1093/computer_journal/bxy036","mag":"2797328508"},"language":"en","primary_location":{"id":"doi:10.1093/computer_journal/bxy036","is_oa":false,"landing_page_url":"https://doi.org/10.1093/computer_journal/bxy036","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112636043","display_name":"Eunsung Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Eunsung Lee","raw_affiliation_strings":["Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea","institution_ids":["https://openalex.org/I123900574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100452155","display_name":"Sang Woo Kim","orcid":"https://orcid.org/0000-0001-6023-1837"},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sang Woo Kim","raw_affiliation_strings":["Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea","institution_ids":["https://openalex.org/I123900574"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112636043"],"corresponding_institution_ids":["https://openalex.org/I123900574"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.6515,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75813041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7937648892402649},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.7599140405654907},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5155446529388428},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5064605474472046},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3733116388320923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.344437837600708},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.331268846988678},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13462132215499878},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.0949009358882904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7937648892402649},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.7599140405654907},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5155446529388428},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5064605474472046},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3733116388320923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.344437837600708},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.331268846988678},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13462132215499878},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0949009358882904},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/computer_journal/bxy036","is_oa":false,"landing_page_url":"https://doi.org/10.1093/computer_journal/bxy036","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W127430167","https://openalex.org/W1781712377","https://openalex.org/W1990557721","https://openalex.org/W2031932719","https://openalex.org/W2112348059","https://openalex.org/W2276949867","https://openalex.org/W2586906012","https://openalex.org/W6605102821","https://openalex.org/W6694884998"],"related_works":["https://openalex.org/W2088556730","https://openalex.org/W1979028543","https://openalex.org/W2783565618","https://openalex.org/W2121945076","https://openalex.org/W3124878213","https://openalex.org/W102909484","https://openalex.org/W2985738660","https://openalex.org/W2040420239","https://openalex.org/W2411592824","https://openalex.org/W2375130369"],"abstract_inverted_index":{"Proxy":[0],"re-signature":[1,30,44,76,83,93,118,137,158],"allows":[2],"a":[3,8,12,15,24,29,67,92,100,103,106,133,147,151,157,162,172],"semi-trusted":[4],"proxy":[5,27,40,47,75,82,117,136],"to":[6,54,98],"transform":[7,23,49,99],"delegatee\u2019s":[9,52],"signature":[10,17,101],"on":[11,18,102],"message":[13,104,183],"into":[14],"delegator\u2019s":[16,56],"the":[19,26,36,39,43,46,51,55,78,110,128,140,144,167],"same":[20],"message.":[21],"To":[22,70,109],"signature,":[25],"uses":[28],"key":[31,94,159],"that":[32,65],"is":[33,60,125,164,177],"received":[34,42],"from":[35],"delegator.":[37],"Once":[38],"has":[41],"key,":[45],"can":[48,95,149,154,169],"all":[50],"signatures":[53],"signatures;":[57],"this":[58,72],"process":[59],"undesirable":[61],"in":[62,127,139],"some":[63],"applications":[64],"require":[66],"fine-grained":[68,88],"delegation.":[69],"overcome":[71],"limitation":[73],"of":[74,80,112],"schemes,":[77],"concept":[79],"conditional":[81,116,135],"was":[84],"proposed.":[85],"It":[86],"provides":[87],"delegation,":[89],"by":[90],"which":[91],"be":[96],"used":[97],"with":[105],"specific":[107],"condition.":[108],"best":[111],"our":[113],"knowledge,":[114],"two":[115],"schemes":[119],"have":[120],"been":[121],"proposed,":[122],"but":[123],"neither":[124],"proved":[126],"standard":[129,141],"model.":[130,142],"We":[131],"propose":[132],"non-interactive":[134],"scheme":[138,176],"In":[143],"proposed":[145],"scheme,":[146],"delegator":[148,168],"choose":[150],"condition":[152,188],"and":[153,185],"non-interactively":[155],"generate":[156],"even":[160],"if":[161],"delegatee":[163],"off-line.":[165],"Therefore,":[166],"fully":[170],"control":[171],"delegation":[173],"process.":[174],"Our":[175],"existentially":[178],"unforgeable":[179],"against":[180],"adaptive":[181,186],"chosen":[182,187],"attack":[184],"attack.":[189]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
