{"id":"https://openalex.org/W2911545281","doi":"https://doi.org/10.1109/cisp-bmei.2018.8633255","title":"Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme","display_name":"Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2911545281","doi":"https://doi.org/10.1109/cisp-bmei.2018.8633255","mag":"2911545281"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei.2018.8633255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei.2018.8633255","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101408383","display_name":"Xiaoming Hu","orcid":"https://orcid.org/0000-0001-8046-6457"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoming Hu","raw_affiliation_strings":["College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112228530","display_name":"Wenrong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenrong Jiang","raw_affiliation_strings":["College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059921876","display_name":"Chuang Ma","orcid":"https://orcid.org/0000-0001-6242-697X"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuang Ma","raw_affiliation_strings":["College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041949740","display_name":"Chengcheng Yu","orcid":"https://orcid.org/0000-0001-9486-1247"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengcheng Yu","raw_affiliation_strings":["College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, China","institution_ids":["https://openalex.org/I135905480"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101408383"],"corresponding_institution_ids":["https://openalex.org/I135905480"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17138493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7520760297775269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7084728479385376},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.6850367784500122},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6581894755363464},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6515374183654785},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.6410564184188843},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.6130408644676208},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.6018614172935486},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.5764790773391724},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5415691137313843},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.538682222366333},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5385699272155762},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49311038851737976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4170264005661011},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4051048755645752},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.387115478515625},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2512158155441284},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08508950471878052}],"concepts":[{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7520760297775269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7084728479385376},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.6850367784500122},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6581894755363464},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6515374183654785},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.6410564184188843},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.6130408644676208},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.6018614172935486},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.5764790773391724},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5415691137313843},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.538682222366333},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5385699272155762},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49311038851737976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4170264005661011},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4051048755645752},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.387115478515625},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2512158155441284},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08508950471878052},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei.2018.8633255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei.2018.8633255","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.47999998927116394,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1538924340","https://openalex.org/W1592741821","https://openalex.org/W1837240359","https://openalex.org/W1968422221","https://openalex.org/W1983057079","https://openalex.org/W2017000523","https://openalex.org/W2075321974","https://openalex.org/W2104698304","https://openalex.org/W2108358140","https://openalex.org/W2147832797","https://openalex.org/W2376234229","https://openalex.org/W2512279523","https://openalex.org/W2549537225","https://openalex.org/W2614858903","https://openalex.org/W2767334456","https://openalex.org/W2781897764","https://openalex.org/W2799846914","https://openalex.org/W3198492012","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2363288909","https://openalex.org/W2606299826","https://openalex.org/W2392925145","https://openalex.org/W2385375699","https://openalex.org/W2356413915","https://openalex.org/W2086410811","https://openalex.org/W1497176106","https://openalex.org/W2392378177","https://openalex.org/W2151288616","https://openalex.org/W140041957"],"abstract_inverted_index":{"Forward":[0],"secure":[1],"proxy":[2],"signature":[3,24,29,35,43,51,74,112,140],"(FoSPS)":[4],"solves":[5,26],"the":[6,16,27,38,42,49,55,63,83,89,100,114,119,124,129,133,139,143],"security":[7],"drawback":[8],"of":[9,14,19,57,91],"private":[10,17],"key":[11,18],"exposure":[12],"problem":[13,31],"generating":[15],"each":[20],"time":[21],"interval.":[22],"Directed":[23],"scheme":[25,71,75],"public":[28],"verification":[30],"in":[32,169],"traditional":[33],"digital":[34],"by":[36,141],"designating":[37],"constant":[39],"one":[40,115],"as":[41,173],"verifier.":[44],"Due":[45],"to":[46,108,137,155],"excellent":[47],"properties,":[48],"two":[50,84,144],"schemes":[52,85,93,145],"have":[53],"attracted":[54],"research":[56],"many":[58],"experts.":[59],"Recently,":[60],"based":[61],"on":[62],"Elliptic":[64],"curve":[65],"cryptography":[66],"(ECC),":[67],"a":[68,110,151],"new":[69],"FoSPS":[70],"and":[72,86,96],"directed":[73],"were":[76],"proposed.":[77],"In":[78,102,123],"this":[79],"paper,":[80],"we":[81,127,148],"analyze":[82],"present":[87,150],"which":[88,164],"either":[90],"both":[92],"is":[94,106,135],"insecure":[95],"do":[97],"not":[98,117],"satisfy":[99],"unforgeability.":[101],"other":[103],"words,":[104],"anyone":[105],"able":[107,136],"forge":[109,138],"valid":[111],"but":[113],"does":[116],"know":[118],"signer's":[120],"secret":[121],"key.":[122],"same":[125],"time,":[126],"give":[128],"main":[130],"reasons":[131],"why":[132],"enemy":[134],"analyzing":[142],"respectively.":[146],"And":[147],"also":[149],"simple":[152],"improvement":[153],"idea":[154],"overcome":[156],"existing":[157],"problems":[158],"without":[159],"adding":[160],"extra":[161],"computational":[162],"cost":[163],"can":[165],"make":[166],"them":[167],"applied":[168],"some":[170],"environments":[171],"such":[172],"e-medical":[174],"information":[175],"system.":[176]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
