{"id":"https://openalex.org/W2890411345","doi":"https://doi.org/10.1109/access.2018.2869041","title":"Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials","display_name":"Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2890411345","doi":"https://doi.org/10.1109/access.2018.2869041","mag":"2890411345"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2869041","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2869041","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2869041","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100633593","display_name":"Huixian Li","orcid":"https://orcid.org/0000-0001-8098-9573"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Huixian","raw_affiliation_strings":["School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100559102","display_name":"Han Zhipeng","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Zhipeng","raw_affiliation_strings":["School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100695684","display_name":"Liqin Wang","orcid":"https://orcid.org/0000-0003-0892-7049"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Liqin","raw_affiliation_strings":["School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038079322","display_name":"Liaojun Pang","orcid":"https://orcid.org/0000-0002-2388-2806"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pang Liaojun","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100633593"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.6515,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76855216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"6","issue":null,"first_page":"53869","last_page":"53881"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8300137519836426},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.7998369932174683},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6167410612106323},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5494174957275391},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.5484963655471802},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5396907329559326},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5315342545509338},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.528915286064148},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.5049620270729065},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.49222221970558167},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.490522563457489},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4870343804359436},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3798648715019226},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3754293918609619},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33682766556739807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2929268479347229},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2684682607650757},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2137811779975891}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8300137519836426},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.7998369932174683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6167410612106323},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5494174957275391},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.5484963655471802},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5396907329559326},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5315342545509338},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.528915286064148},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.5049620270729065},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.49222221970558167},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.490522563457489},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4870343804359436},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3798648715019226},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3754293918609619},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33682766556739807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2929268479347229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2684682607650757},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2137811779975891}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2869041","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2869041","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e9e51d46526f4b95a9744d0dacc59d92","is_oa":true,"landing_page_url":"https://doaj.org/article/e9e51d46526f4b95a9744d0dacc59d92","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 53869-53881 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2869041","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2869041","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6568010575","display_name":null,"funder_award_id":"2018JM6064","funder_id":"https://openalex.org/F4320324173","funder_display_name":"Natural Science Foundation of Shaanxi Province"},{"id":"https://openalex.org/G7408684587","display_name":null,"funder_award_id":"61473214","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G747916205","display_name":null,"funder_award_id":"61103178","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324173","display_name":"Natural Science Foundation of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W72439343","https://openalex.org/W1590823599","https://openalex.org/W1592092778","https://openalex.org/W1601001795","https://openalex.org/W1776947587","https://openalex.org/W1821087317","https://openalex.org/W2011157967","https://openalex.org/W2076965705","https://openalex.org/W2078194183","https://openalex.org/W2137147061","https://openalex.org/W2137181890","https://openalex.org/W2159845428","https://openalex.org/W2295952533","https://openalex.org/W2395102461","https://openalex.org/W2472483382","https://openalex.org/W2483632714","https://openalex.org/W2523744263","https://openalex.org/W3030707664","https://openalex.org/W6635176429","https://openalex.org/W6635412825","https://openalex.org/W6638384581","https://openalex.org/W6778277509"],"related_works":["https://openalex.org/W2951442315","https://openalex.org/W2385375699","https://openalex.org/W2348693162","https://openalex.org/W2347733707","https://openalex.org/W2804832731","https://openalex.org/W2434026374","https://openalex.org/W1016275899","https://openalex.org/W2358169816","https://openalex.org/W2370326681","https://openalex.org/W2944471808"],"abstract_inverted_index":{"Most":[0],"of":[1,23,46,64,66,110,112],"the":[2,12,21,44,62,79,84,87,95,99,108,116,119,141,150],"existing":[3,117],"blind":[4,56,92],"proxy":[5,57],"re-signature":[6,58],"schemes":[7],"are":[8],"designed":[9],"based":[10,60],"on":[11,20,61],"traditional":[13],"public":[14],"key":[15],"cryptosystems,":[16],"whose":[17],"security":[18,76],"relies":[19],"hardness":[22],"big":[24],"integer":[25],"factoring,":[26],"discrete":[27,31],"logarithm,":[28,32],"elliptic":[29],"curve":[30],"and":[33,73,98,134],"so":[34],"on.":[35],"However,":[36],"these":[37,51],"problems":[38],"will":[39],"be":[40,90,103],"unsecure":[41],"when":[42],"facing":[43],"attack":[45],"quantum":[47,71,128,152],"computers.":[48],"Motivated":[49],"by":[50,93,106],"concerns,":[52],"we":[53],"proposed":[54,85,142],"a":[55,145],"scheme":[59,121,143],"problem":[63,109],"isomorphisms":[65,111],"polynomials,":[67],"which":[68],"can":[69,89,102],"resist":[70],"attack,":[72],"gave":[74],"its":[75],"proof":[77],"under":[78],"random":[80],"oracle":[81],"model.":[82],"In":[83],"scheme,":[86],"message":[88,132],"kept":[91,104],"using":[94,107],"hash":[96],"function,":[97],"delegatee's":[100],"identity":[101],"anonymous":[105],"polynomials.":[113],"Compared":[114],"with":[115,155],"schemes,":[118],"new":[120],"has":[122,144],"more":[123],"secure":[124],"properties,":[125],"such":[126],"as":[127],"resistance,":[129],"high":[130],"efficiency,":[131],"blindness,":[133],"delegatee":[135],"anonymity.":[136],"It":[137],"is":[138],"concluded":[139],"that":[140],"good":[146],"application":[147],"prospect":[148],"in":[149],"future":[151],"computing":[153],"environment":[154],"low-power":[156],"hardware.":[157]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
