{"id":"https://openalex.org/W2151288616","doi":"https://doi.org/10.1109/aina.2004.1283828","title":"Provably secure and id-based group signature scheme","display_name":"Provably secure and id-based group signature scheme","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2151288616","doi":"https://doi.org/10.1109/aina.2004.1283828","mag":"2151288616"},"language":"en","primary_location":{"id":"doi:10.1109/aina.2004.1283828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2004.1283828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103090290","display_name":"Zewen Chen","orcid":"https://orcid.org/0000-0001-7791-0959"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zewen Chen","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110380607","display_name":"Jiwu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100888734","display_name":"Daren Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daren Huang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["State of Key Laboratory on ISN, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State of Key Laboratory on ISN, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100624904","display_name":"Yumin Wang","orcid":"https://orcid.org/0000-0001-8243-3659"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yumin Wang","raw_affiliation_strings":["State of Key Laboratory on ISN, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State of Key Laboratory on ISN, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103090290"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.4497,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76168417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"384","last_page":"387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10304","display_name":"Geometric and Algebraic Topology","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.8756203651428223},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.838839054107666},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.8162546753883362},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7843348383903503},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.7815245985984802},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.7676595449447632},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7232064008712769},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.643620491027832},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6383841037750244},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.5984070897102356},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5251486301422119},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5241173505783081},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3793175518512726},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34344324469566345},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3359403610229492},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3338473439216614},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23536163568496704},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1889374554157257},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.08117160201072693}],"concepts":[{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.8756203651428223},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.838839054107666},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.8162546753883362},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7843348383903503},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.7815245985984802},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.7676595449447632},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7232064008712769},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643620491027832},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6383841037750244},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.5984070897102356},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5251486301422119},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5241173505783081},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3793175518512726},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34344324469566345},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3359403610229492},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3338473439216614},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23536163568496704},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1889374554157257},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.08117160201072693},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aina.2004.1283828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2004.1283828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W7410000","https://openalex.org/W185135035","https://openalex.org/W1577274403","https://openalex.org/W1589034595","https://openalex.org/W1607188293","https://openalex.org/W1998865180","https://openalex.org/W2002679629","https://openalex.org/W2019249545","https://openalex.org/W2058287446","https://openalex.org/W2135656098","https://openalex.org/W2138904943","https://openalex.org/W2145965403","https://openalex.org/W2170017018","https://openalex.org/W2405024498","https://openalex.org/W2911424200","https://openalex.org/W4239040058","https://openalex.org/W6634332874","https://openalex.org/W6636188402","https://openalex.org/W6665277055","https://openalex.org/W6680329387","https://openalex.org/W6681713178","https://openalex.org/W6758715590"],"related_works":["https://openalex.org/W2151288616","https://openalex.org/W2407618154","https://openalex.org/W2372089223","https://openalex.org/W2348274958","https://openalex.org/W2134107133","https://openalex.org/W2119547174","https://openalex.org/W2356237935","https://openalex.org/W1565842368","https://openalex.org/W2379490007","https://openalex.org/W2375852898"],"abstract_inverted_index":{"There":[0],"are":[1],"two":[2,28],"important":[3],"directions":[4],"in":[5,58],"group":[6,10,16,36,43,50],"signature":[7,11,17,37,44,51],"scheme:":[8],"ID-based":[9,35],"scheme":[12,38,54,68],"and":[13,24,30,71],"provably":[14,33,56],"secure":[15,34,57],"scheme.":[18,45],"We":[19],"first":[20],"analyze":[21],"the":[22,41,64],"advantages":[23],"flaws":[25],"of":[26],"these":[27],"directions,":[29],"propose":[31],"a":[32],"basing":[39],"on":[40],"ACJT":[42,65],"Compared":[46,62],"with":[47,63],"prior":[48],"ID-Based":[49,70],"scheme,":[52,66],"our":[53,67],"is":[55,69],"random":[59],"oracle":[60],"model.":[61],"strong":[72],"nonrepudiation.":[73]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
