{"id":"https://openalex.org/W4411949138","doi":"https://doi.org/10.1109/iwcmc65282.2025.11059588","title":"Threshold Anonymous Counting Tokens with Batch Proofs for Online Paywalls","display_name":"Threshold Anonymous Counting Tokens with Batch Proofs for Online Paywalls","publication_year":2025,"publication_date":"2025-05-12","ids":{"openalex":"https://openalex.org/W4411949138","doi":"https://doi.org/10.1109/iwcmc65282.2025.11059588"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc65282.2025.11059588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc65282.2025.11059588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035820331","display_name":"Yanqi Zhao","orcid":"https://orcid.org/0000-0002-1023-6549"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanqi Zhao","raw_affiliation_strings":["Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054926685","display_name":"M.-T. Sun","orcid":"https://orcid.org/0000-0003-1273-0505"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghong Sun","raw_affiliation_strings":["Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114858845","display_name":"Min Xie","orcid":"https://orcid.org/0000-0001-5690-5114"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Xie","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen,School of Computer Science and Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen,School of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045080351","display_name":"Xiaoyi Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyi Yang","raw_affiliation_strings":["Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an University of Posts and Telecommunications,School of Cyberspace Security,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["Shaanxi Normal University,School of Computer Science,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Normal University,School of Computer Science,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I88830068"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035820331"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08578378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1632","last_page":"1637"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7556695938110352},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6790313720703125},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38610658049583435},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24045711755752563}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7556695938110352},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6790313720703125},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38610658049583435},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24045711755752563},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc65282.2025.11059588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc65282.2025.11059588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W27238938","https://openalex.org/W2026892462","https://openalex.org/W2038704326","https://openalex.org/W2100460660","https://openalex.org/W2117797270","https://openalex.org/W2165297797","https://openalex.org/W2800652629","https://openalex.org/W3013030147","https://openalex.org/W3041566224","https://openalex.org/W4385654286","https://openalex.org/W4388857853","https://openalex.org/W4389897209"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4394650907","https://openalex.org/W154364797","https://openalex.org/W4254119641","https://openalex.org/W3196207352","https://openalex.org/W2951724202","https://openalex.org/W3084261076","https://openalex.org/W2576399385"],"abstract_inverted_index":{"As":[0],"online":[1,38,85],"application":[2],"services":[3],"evolve,":[4],"an":[5],"increasing":[6],"number":[7],"of":[8,45,53,109,135,161],"users":[9],"are":[10,33],"opting":[11],"for":[12,84,92],"subscription-based":[13],"or":[14],"paywall":[15,39],"models":[16],"to":[17,49,105,124,140,200],"access":[18,28,81],"high-quality":[19],"content.":[20],"Anonymous":[21],"counting":[22,70,184],"tokens":[23,71,111],"(ACTs),":[24],"which":[25],"regulate":[26],"user":[27,31],"while":[29,131],"protecting":[30],"privacy,":[32],"widely":[34],"adopted":[35],"in":[36,63,191],"the":[37,42,89,101,126,133,158,196,202],"model.":[40],"However,":[41],"centralized":[43],"server":[44],"ACT":[46],"may":[47],"lead":[48],"a":[50],"single":[51],"point":[52],"failure,":[54],"thereby":[55],"exposing":[56],"users\u2019":[57],"privacy.":[58],"To":[59],"address":[60],"this":[61,64],"challenge,":[62],"paper,":[65],"we":[66,156],"propose":[67],"threshold":[68,102,197],"anonymous":[69,110],"with":[72,167],"batch":[73,114,181],"proofs":[74,123],"(ThrACT)":[75],"that":[76,147,174],"balance":[77],"privacy":[78],"preservation":[79],"and":[80,94,112,128,151,164,183],"count":[82],"limitation":[83],"paywalls.":[86],"We":[87,99,144],"define":[88],"system":[90],"model":[91],"ThrACT":[93,119,148,163,175],"provide":[95],"its":[96],"concrete":[97],"construction.":[98],"utilize":[100],"Boneh-Boyen":[103],"signature":[104],"facilitate":[106],"distributed":[107,179],"issuance":[108,204],"enable":[113],"issuance.":[115],"In":[116,193],"addition,":[117],"our":[118,162],"employs":[120],"non-interactive":[121],"zero-knowledge":[122],"verify":[125],"label":[127],"token":[129,138,203],"requests":[130],"allowing":[132],"correctness":[134],"multiple":[136],"blind":[137],"shares":[139],"be":[141],"validated":[142],"simultaneously.":[143],"also":[145,187],"prove":[146],"satisfies":[149],"unforgeable":[150],"unlinkable":[152],"security":[153],"properties.":[154],"Finally,":[155],"evaluate":[157],"computational":[159,189],"cost":[160],"compare":[165],"it":[166],"other":[168],"schemes.":[169],"The":[170],"experiment":[171],"result":[172],"demonstrates":[173],"not":[176],"only":[177],"supports":[178],"issuance,":[180],"verification,":[182],"functionalities":[185],"but":[186],"achieves":[188],"overhead":[190],"milliseconds.":[192,209],"particular,":[194],"when":[195],"is":[198,206],"set":[199],"(3,5),":[201],"time":[205],"approximately":[207],"9":[208]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
