{"id":"https://openalex.org/W4411055168","doi":"https://doi.org/10.1109/jiot.2025.3576929","title":"Two-Round Identity-Based Proxy Blind Signature Scheme on Lattices","display_name":"Two-Round Identity-Based Proxy Blind Signature Scheme on Lattices","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411055168","doi":"https://doi.org/10.1109/jiot.2025.3576929"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3576929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3576929","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035529534","display_name":"Quanrun Li","orcid":"https://orcid.org/0000-0003-4691-1099"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Quanrun Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Cyber Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Lin","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100398361","display_name":"Zhichao Wang","orcid":"https://orcid.org/0000-0001-9885-3463"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035529534"],"corresponding_institution_ids":["https://openalex.org/I1328775524"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0584775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"16","first_page":"33621","last_page":"33634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.948199987411499,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.932200014591217,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7142276167869568},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.556677520275116},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5353586673736572},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.43734872341156006},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3677513301372528},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35646021366119385},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3554531931877136},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20439183712005615},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.08195760846138},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0646774172782898}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7142276167869568},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.556677520275116},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5353586673736572},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.43734872341156006},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3677513301372528},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35646021366119385},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3554531931877136},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20439183712005615},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.08195760846138},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0646774172782898},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3576929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3576929","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2820427620","display_name":null,"funder_award_id":"62402443","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2974838370","display_name":null,"funder_award_id":"LQN25F020006","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W74973629","https://openalex.org/W995268971","https://openalex.org/W1492137673","https://openalex.org/W1506251333","https://openalex.org/W1534038653","https://openalex.org/W1537360597","https://openalex.org/W1569083856","https://openalex.org/W1572559454","https://openalex.org/W1601001795","https://openalex.org/W1608511627","https://openalex.org/W1922372005","https://openalex.org/W1965381902","https://openalex.org/W1983370494","https://openalex.org/W1988089083","https://openalex.org/W1992742943","https://openalex.org/W2004659764","https://openalex.org/W2011112377","https://openalex.org/W2013752865","https://openalex.org/W2023217243","https://openalex.org/W2038761522","https://openalex.org/W2052087587","https://openalex.org/W2098290658","https://openalex.org/W2100222059","https://openalex.org/W2119411967","https://openalex.org/W2139645560","https://openalex.org/W2142048307","https://openalex.org/W2146878212","https://openalex.org/W2167179301","https://openalex.org/W2312594896","https://openalex.org/W2604697283","https://openalex.org/W2624777124","https://openalex.org/W2803289807","https://openalex.org/W2905294008","https://openalex.org/W2948035125","https://openalex.org/W3022414189","https://openalex.org/W3037315640","https://openalex.org/W3092193039","https://openalex.org/W3152454803","https://openalex.org/W4200634004","https://openalex.org/W4312305646","https://openalex.org/W4367459274","https://openalex.org/W4385490704","https://openalex.org/W4391404224","https://openalex.org/W4407466189","https://openalex.org/W4407835159","https://openalex.org/W6603265344"],"related_works":["https://openalex.org/W2028495302","https://openalex.org/W4396872084","https://openalex.org/W4249498729","https://openalex.org/W1975289146","https://openalex.org/W2002261065","https://openalex.org/W1513656766","https://openalex.org/W1967083444","https://openalex.org/W2160863446","https://openalex.org/W2106866459","https://openalex.org/W2055312385"],"abstract_inverted_index":{"As":[0],"Internet":[1],"technology":[2],"develops":[3],"swiftly,":[4],"the":[5,13,23,26,34,42,51,57,65,91,97,129,178,181,185],"significance":[6],"of":[7,15,25,28,53,67,125,180],"privacy":[8],"protection":[9],"is":[10,72,169],"escalating":[11],"in":[12,75],"realms":[14],"e-commerce,":[16],"e-government":[17],"and":[18,31,71,78,96,121,189],"software":[19],"security.":[20],"Due":[21],"to":[22,103,161],"combination":[24],"benefits":[27],"proxy":[29,35,59,84,113,141],"signatures":[30],"blind":[32,36,60,85,114,142],"signatures,":[33],"signature":[37,61,86,115,143,166],"scheme":[38,144,149,167],"not":[39],"only":[40,118],"distributes":[41],"workload":[43],"across":[44],"application":[45],"networks":[46],"but":[47],"also":[48],"effectively":[49],"safeguards":[50],"confidentiality":[52],"sensitive":[54],"information.":[55],"Additionally,":[56,175],"identity-based":[58,83,140],"protocol":[62,154,183],"can":[63],"avoid":[64],"problem":[66,95,100],"heavy":[68],"certificate":[69],"management":[70],"widely":[73],"used":[74],"electronic":[76],"commerce":[77],"other":[79],"scenarios.":[80],"However,":[81],"some":[82],"protocols":[87,116],"that":[88,168],"rely":[89],"on":[90,146,155],"large":[92],"integer":[93],"factorization":[94],"discrete":[98],"logarithm":[99],"are":[101],"unable":[102],"withstand":[104],"from":[105,107,171],"attacks":[106],"quantum":[108],"computers.":[109],"Furthermore,":[110],"current":[111],"lattice-based":[112],"offer":[117],"heuristic":[119],"security":[120,172,179],"require":[122],"three":[123],"rounds":[124],"information":[126],"exchange":[127],"during":[128],"signing":[130],"phase.":[131],"In":[132],"this":[133],"paper,":[134],"we":[135,176],"introduce":[136],"a":[137,151,191],"new":[138],"two-round":[139,165],"based":[145],"lattices.":[147],"This":[148],"utilizes":[150],"zero-knowledge":[152],"proof":[153,173],"lattices":[156],"as":[157],"its":[158],"core":[159],"component":[160],"develop":[162],"an":[163],"interactive":[164],"free":[170],"vulnerabilities.":[174],"validate":[177],"proposed":[182],"within":[184],"random":[186],"oracle":[187],"model":[188],"conduct":[190],"performance":[192],"analysis.":[193]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
