{"id":"https://openalex.org/W2815354319","doi":"https://doi.org/10.1109/access.2018.2853703","title":"Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt","display_name":"Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2815354319","doi":"https://doi.org/10.1109/access.2018.2853703","mag":"2815354319"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2853703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2853703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2853703","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["Department of Information Security, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034031357","display_name":"Wei Ren","orcid":"https://orcid.org/0000-0001-8590-1737"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Ren","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036801346","display_name":"Tianqing Zhu","orcid":"https://orcid.org/0000-0003-3411-7947"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tianqing Zhu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101812346","display_name":"Yi Ren","orcid":"https://orcid.org/0000-0001-7423-6719"},"institutions":[{"id":"https://openalex.org/I1118541","display_name":"University of East Anglia","ror":"https://ror.org/026k5mg93","country_code":"GB","type":"education","lineage":["https://openalex.org/I1118541"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yi Ren","raw_affiliation_strings":["School of Computing Science, University of East Anglia, Norwich, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of East Anglia, Norwich, U.K","institution_ids":["https://openalex.org/I1118541"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Security, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060268538"],"corresponding_institution_ids":["https://openalex.org/I3124059619"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.1692,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59472202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"37850","last_page":"37857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7731711864471436},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.6905733346939087},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6904575824737549},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6468862295150757},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6261386871337891},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5753228664398193},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4438866674900055},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33369553089141846},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2370789647102356},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23006504774093628},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.2084428369998932},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16473323106765747},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15858250856399536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7731711864471436},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.6905733346939087},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6904575824737549},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6468862295150757},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6261386871337891},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5753228664398193},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4438866674900055},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33369553089141846},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2370789647102356},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23006504774093628},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2084428369998932},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16473323106765747},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15858250856399536},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2018.2853703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2853703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:ueaeprints.uea.ac.uk:67889","is_oa":true,"landing_page_url":null,"pdf_url":"https://ueaeprints.uea.ac.uk/id/eprint/67889/1/Accepted_manuscript.pdf","source":{"id":"https://openalex.org/S4306400384","display_name":"UEA Digital Repository (University of East Anglia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1118541","host_organization_name":"University of East Anglia","host_organization_lineage":["https://openalex.org/I1118541"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:07abb9df7e8a4e7c89633d151c06afbb","is_oa":true,"landing_page_url":"https://doaj.org/article/07abb9df7e8a4e7c89633d151c06afbb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 37850-37857 (2018)","raw_type":"article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/132467","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/132467","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2853703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2853703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1566859498","display_name":null,"funder_award_id":"20183001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3591253195","display_name":null,"funder_award_id":"2017BDKFJJ006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5732700120","display_name":null,"funder_award_id":"61502362","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6467016607","display_name":null,"funder_award_id":"KLIGIP2016A05","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8955107213","display_name":null,"funder_award_id":"Major","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G978106338","display_name":null,"funder_award_id":"20183001","funder_id":"https://openalex.org/F4320329858","funder_display_name":"Major Scientific and Technological Special Project of Guizhou Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329858","display_name":"Major Scientific and Technological Special Project of Guizhou Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1589034595","https://openalex.org/W1643928249","https://openalex.org/W1832688593","https://openalex.org/W1925483862","https://openalex.org/W1989026409","https://openalex.org/W1990291343","https://openalex.org/W1996360405","https://openalex.org/W1998368731","https://openalex.org/W2000847945","https://openalex.org/W2003661250","https://openalex.org/W2006616227","https://openalex.org/W2016645377","https://openalex.org/W2021213908","https://openalex.org/W2023655763","https://openalex.org/W2024406794","https://openalex.org/W2039989029","https://openalex.org/W2042908314","https://openalex.org/W2051448870","https://openalex.org/W2054946102","https://openalex.org/W2055378952","https://openalex.org/W2099457974","https://openalex.org/W2112914778","https://openalex.org/W2197156666","https://openalex.org/W2295016360","https://openalex.org/W2337704804","https://openalex.org/W2353614495","https://openalex.org/W2593793222","https://openalex.org/W2594028680","https://openalex.org/W2941934697","https://openalex.org/W3125631934","https://openalex.org/W4232836212","https://openalex.org/W6638626492"],"related_works":["https://openalex.org/W2057152612","https://openalex.org/W2392378177","https://openalex.org/W3177125027","https://openalex.org/W1524651855","https://openalex.org/W2365022962","https://openalex.org/W2388209206","https://openalex.org/W2054449481","https://openalex.org/W2383048426","https://openalex.org/W1492498363","https://openalex.org/W4387407403"],"abstract_inverted_index":{"Bilinear":[0],"pairing,":[1],"an":[2,38],"essential":[3],"tool":[4],"to":[5,22,45],"construct-efficient":[6],"digital":[7,49,79,167],"signatures,":[8],"has":[9,135],"applications":[10],"in":[11,89,95,103,112],"mobile":[12,33,55],"devices":[13,56],"and":[14,30,65,87,105,110,127,130,140,154,180],"other":[15,31],"applications.":[16],"One":[17],"particular":[18],"research":[19],"challenge":[20],"is":[21,188,192],"design":[23],"cross-platform":[24],"security":[25,147],"protocols":[26],"(e.g.":[27],"Windows,":[28,125],"Linux,":[29],"popular":[32,78],"operating":[34],"systems)":[35],"while":[36,57],"achieving":[37],"optimal":[39],"security-performance":[40,74],"tradeoff.":[41],"That":[42],"is,":[43],"how":[44],"choose":[46],"the":[47,59,73,136,150,156,159,165,171,195],"right":[48],"signature":[50,80,168],"algorithm,":[51],"for":[52],"example,":[53],"on":[54,61,114,124,176],"considering":[58],"limitations":[60],"both":[62],"computation":[63],"capacity":[64],"battery":[66],"life.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,162],"examine":[72],"tradeoff":[75],"of":[76,158,173,185],"four":[77],"algorithms,":[81],"namely:":[82],"CC":[83],"(proposed":[84,92,98,107],"by":[85,93,99,108],"Cha":[86],"Cheon":[88],"2003),":[90],"Hess":[91,94],"2002),":[96],"BLMQ":[97,133,166],"Barreto":[100],"et":[101],"al.":[102],"2005),":[104],"PS":[106,186],"Paterson":[109],"Schuldt":[111],"2006),":[113],"various":[115],"platforms.":[116],"We":[117,143],"empirically":[118],"evaluate":[119],"their":[120,146],"performance":[121],"using":[122],"experiments":[123],"Android,":[126],"Linux":[128],"platforms,":[129],"find":[131],"that":[132,164],"algorithm":[134,187],"highest":[137],"computational":[138],"efficiency":[139,184],"communication":[141],"efficiency.":[142],"also":[144],"study":[145],"properties":[148],"under":[149,194],"random":[151],"oracle":[152],"model":[153],"assuming":[155],"intractability":[157],"CDH":[160],"problem,":[161],"reveal":[163],"scheme":[169],"satisfies":[170],"property":[172],"existential":[174],"unforgeable":[175],"adaptively":[177],"chosen":[178],"message":[179],"ID":[181],"attack.":[182],"The":[183],"lower,":[189],"but":[190],"it":[191],"secure":[193],"standard":[196],"model.":[197]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
