{"id":"https://openalex.org/W2111490003","doi":"https://doi.org/10.1109/bmei.2012.6512967","title":"Fuzzy identity-based threshold signature scheme based on bilinear maps","display_name":"Fuzzy identity-based threshold signature scheme based on bilinear maps","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2111490003","doi":"https://doi.org/10.1109/bmei.2012.6512967","mag":"2111490003"},"language":"en","primary_location":{"id":"doi:10.1109/bmei.2012.6512967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2012.6512967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on BioMedical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101744715","display_name":"Changji Wang","orcid":"https://orcid.org/0000-0003-2988-4404"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang-Ji Wang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China","School of Information Science and Technology; Sun Yat-Sen University; Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Information Science and Technology; Sun Yat-Sen University; Guangzhou China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101894206","display_name":"Jung\u2010Tae Kim","orcid":"https://orcid.org/0000-0002-4414-1580"},"institutions":[{"id":"https://openalex.org/I3133486578","display_name":"Mokwon University","ror":"https://ror.org/01whq8m38","country_code":"KR","type":"education","lineage":["https://openalex.org/I3133486578"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jung-Tae Kim","raw_affiliation_strings":["Department of Electronic Engineering, Network and Information Security Lab, Mokwon University, Taejon 302729, Korea","Dept. of Electron. Eng., Mokwon Univ., Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Network and Information Security Lab, Mokwon University, Taejon 302729, Korea","institution_ids":["https://openalex.org/I3133486578"]},{"raw_affiliation_string":"Dept. of Electron. Eng., Mokwon Univ., Daejeon, South Korea","institution_ids":["https://openalex.org/I3133486578"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101744715"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12648788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1312","last_page":"1316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7318606972694397},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6701043844223022},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6646062135696411},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5779469609260559},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5700690746307373},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5521214008331299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5168617367744446},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47867971658706665},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4738990366458893},{"id":"https://openalex.org/keywords/bilinear-map","display_name":"Bilinear map","score":0.46917277574539185},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4556792378425598},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4187447428703308},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3910127878189087},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.328345388174057},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19881319999694824}],"concepts":[{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7318606972694397},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6701043844223022},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6646062135696411},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5779469609260559},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5700690746307373},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5521214008331299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5168617367744446},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47867971658706665},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4738990366458893},{"id":"https://openalex.org/C142685569","wikidata":"https://www.wikidata.org/wiki/Q1086961","display_name":"Bilinear map","level":3,"score":0.46917277574539185},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4556792378425598},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4187447428703308},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3910127878189087},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.328345388174057},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19881319999694824},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bmei.2012.6512967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2012.6512967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on BioMedical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1592092778","https://openalex.org/W1643928249","https://openalex.org/W1730634423","https://openalex.org/W1867048327","https://openalex.org/W1965387389","https://openalex.org/W1965825292","https://openalex.org/W1990117490","https://openalex.org/W2097128232","https://openalex.org/W2134600261","https://openalex.org/W2138001464","https://openalex.org/W2160608575","https://openalex.org/W6629862473","https://openalex.org/W6635412825","https://openalex.org/W6636882991","https://openalex.org/W6637580987","https://openalex.org/W6639162682","https://openalex.org/W6679596821"],"related_works":["https://openalex.org/W2946208069","https://openalex.org/W1994004144","https://openalex.org/W3177913317","https://openalex.org/W1963546854","https://openalex.org/W4287102253","https://openalex.org/W3028820650","https://openalex.org/W1974314423","https://openalex.org/W2017250869","https://openalex.org/W2031905258","https://openalex.org/W2583099064"],"abstract_inverted_index":{"Threshold":[0],"signature":[1,80,96,111,122],"is":[2,55,128],"a":[3,79,94,116],"useful":[4],"tool":[5],"for":[6],"sharing":[7],"the":[8,18,28,39,49,83,100,125],"power":[9],"to":[10],"sign,":[11],"which":[12],"has":[13],"been":[14],"extensively":[15],"studied":[16],"in":[17,130],"certificate-based":[19],"public":[20],"key":[21,54],"setting":[22],"and":[23,32,104,115],"identity-based":[24,35,43,52,109,120],"setting.":[25],"Inspired":[26],"by":[27,64],"work":[29],"of":[30,41,70,75,99,107],"Sahai":[31],"Waters's":[33],"fuzzy":[34,42,108,119],"encryption,":[36],"we":[37],"introduce":[38],"concept":[40],"threshold":[44,110,121],"signature.":[45],"In":[46],"this":[47,131],"notion,":[48],"trusted":[50],"dealer's":[51],"private":[53],"shared":[56],"among":[57],"n":[58,76],"participating":[59,72,89],"parties":[60,73,90],"who":[61],"are":[62,113],"identified":[63],"their":[65],"attribute":[66],"sets,":[67],"any":[68],"subset":[69],"t":[71,88],"out":[74],"can":[77,91],"generate":[78],"on":[81,97,124],"behalf":[82,98],"dealer,":[84],"but":[85],"fewer":[86],"than":[87],"not":[92],"create":[93],"valid":[95],"dealer.":[101],"The":[102],"definition":[103],"security":[105],"model":[106],"scheme":[112],"formalized,":[114],"provably":[117],"secure":[118],"based":[123],"bilinear":[126],"maps":[127],"presented":[129],"paper.":[132]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
