{"id":"https://openalex.org/W4386207873","doi":"https://doi.org/10.1109/iscc58397.2023.10217862","title":"Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers","display_name":"Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers","publication_year":2023,"publication_date":"2023-07-09","ids":{"openalex":"https://openalex.org/W4386207873","doi":"https://doi.org/10.1109/iscc58397.2023.10217862"},"language":"en","primary_location":{"id":"doi:10.1109/iscc58397.2023.10217862","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iscc58397.2023.10217862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084877950","display_name":"Aozhuo Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Aozhuo Sun","raw_affiliation_strings":["Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100683081","display_name":"Bingyu Li","orcid":"https://orcid.org/0000-0001-5925-1638"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingyu Li","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University,Beijing,China","School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University,Beijing,China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011886723","display_name":"Qiongxiao Wang","orcid":"https://orcid.org/0000-0002-8012-8295"},"institutions":[{"id":"https://openalex.org/I2801882885","display_name":"China Atomic Energy Authority","ror":"https://ror.org/056frtj18","country_code":"CN","type":"government","lineage":["https://openalex.org/I2801882885"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiongxiao Wang","raw_affiliation_strings":["Beijing Certificate Authority Co., Ltd,Beijing,China","Beijing Certificate Authority Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Certificate Authority Co., Ltd,Beijing,China","institution_ids":["https://openalex.org/I2801882885"]},{"raw_affiliation_string":"Beijing Certificate Authority Co., Ltd, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089952940","display_name":"Huiqing Wan","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqing Wan","raw_affiliation_strings":["Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["School of Cyber Security, University of Science and Technology of China,Hefei,China","School of Cyber Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100392305","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-4457-6709"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084877950"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55382969,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1207","last_page":"1213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.7906316518783569},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7505861520767212},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6408371329307556},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6342577338218689},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5617743730545044},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5243772864341736},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.518256425857544},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5097398161888123},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4581559896469116},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.4511038362979889},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4402673840522766},{"id":"https://openalex.org/keywords/opacity","display_name":"Opacity","score":0.41290485858917236},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.17944106459617615},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1120542585849762},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1069292426109314}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.7906316518783569},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7505861520767212},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6408371329307556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6342577338218689},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5617743730545044},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5243772864341736},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.518256425857544},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5097398161888123},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4581559896469116},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.4511038362979889},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4402673840522766},{"id":"https://openalex.org/C60056205","wikidata":"https://www.wikidata.org/wiki/Q691914","display_name":"Opacity","level":2,"score":0.41290485858917236},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.17944106459617615},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1120542585849762},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1069292426109314},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc58397.2023.10217862","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iscc58397.2023.10217862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[{"id":"https://openalex.org/G1766090909","display_name":null,"funder_award_id":"2020YFB1005800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2970563681","display_name":null,"funder_award_id":"YWF-22-L-1272","funder_id":"https://openalex.org/F4320321125","funder_display_name":"Beihang University"},{"id":"https://openalex.org/G4562745535","display_name":null,"funder_award_id":"62002011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321125","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1851414966","https://openalex.org/W2095738444","https://openalex.org/W2161214567","https://openalex.org/W2331243272","https://openalex.org/W2769047723","https://openalex.org/W2889666008","https://openalex.org/W2899471681","https://openalex.org/W2946807275","https://openalex.org/W2969419280","https://openalex.org/W2984693548","https://openalex.org/W2986143645","https://openalex.org/W2996691633","https://openalex.org/W3098142495","https://openalex.org/W3105355360","https://openalex.org/W3155377407","https://openalex.org/W3184152227","https://openalex.org/W4286255710","https://openalex.org/W4308463084","https://openalex.org/W4385412367","https://openalex.org/W6639042595","https://openalex.org/W6786193586"],"related_works":["https://openalex.org/W2161791806","https://openalex.org/W2073474947","https://openalex.org/W4366824690","https://openalex.org/W2613656770","https://openalex.org/W2482431380","https://openalex.org/W2082077321","https://openalex.org/W2053059436","https://openalex.org/W4313201885","https://openalex.org/W2401696997","https://openalex.org/W2023067683"],"abstract_inverted_index":{"Certificate":[0],"Transparency":[1],"(CT)":[2],"enables":[3,110],"timely":[4],"detection":[5,125],"of":[6,23,70,145],"problematic":[7],"certification":[8],"authorities":[9],"(CAs)":[10],"by":[11,98],"publicly":[12],"recording":[13],"all":[14],"CA-issued":[15],"certificates.":[16,33,52],"This":[17],"transparency":[18,77],"inevitably":[19],"leaks":[20],"the":[21,28,37,48,64,68,74,88,130,141],"privacy":[22,38],"identity":[24,29,57],"owners":[25],"(IdOs)":[26],"through":[27,134],"information":[30],"bound":[31],"in":[32,51,129],"In":[34],"response":[35],"to":[36,63,91,95,113],"leakage,":[39],"several":[40],"privacy-preserving":[41],"schemes":[42],"have":[43],"been":[44],"proposed":[45],"that":[46,86],"transform/hash/encrypt":[47],"privacy-carrying":[49],"part":[50],"However,":[53],"these":[54],"certificates":[55,89,115],"conceal":[56],"while":[58],"also":[59,121],"making":[60],"it":[61],"opaque":[62,94],"IdO,":[65],"which":[66],"defeats":[67],"purpose":[69],"CT.":[71],"To":[72],"address":[73],"contradiction":[75],"between":[76],"and":[78,126,136,143],"privacy,":[79],"we":[80,139],"propose":[81],"Semi-CT,":[82],"a":[83],"semi-transparency":[84],"mechanism":[85],"makes":[87],"transparent":[90],"IdOs":[92,112],"but":[93],"snoopers.":[96],"Inspired":[97],"public-key":[99],"encryption":[100],"with":[101,117],"keyword":[102],"search":[103],"(PEKS),":[104],"Semi-CT":[105,120,146],"based":[106],"on":[107],"bilinear":[108],"pairing":[109],"trapdoor-holding":[111],"retrieve":[114],"associated":[116],"their":[118],"identity.":[119],"addresses":[122],"protocol":[123],"deviation":[124],"trapdoor":[127],"protection":[128],"malicious":[131],"model.":[132],"Finally,":[133],"theoretical":[135],"experimental":[137],"analysis,":[138],"prove":[140],"security":[142],"feasibility":[144],"for":[147],"practical":[148],"applications.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
