{"id":"https://openalex.org/W2944197066","doi":"https://doi.org/10.1109/jsyst.2019.2910934","title":"White-Box Implementation of Shamir\u2019s Identity-Based Signature Scheme","display_name":"White-Box Implementation of Shamir\u2019s Identity-Based Signature Scheme","publication_year":2019,"publication_date":"2019-05-09","ids":{"openalex":"https://openalex.org/W2944197066","doi":"https://doi.org/10.1109/jsyst.2019.2910934","mag":"2944197066"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2019.2910934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2910934","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087506605","display_name":"Qi Feng","orcid":"https://orcid.org/0000-0002-6927-7855"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Feng","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087506605"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.1561,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84040246,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"14","issue":"2","first_page":"1820","last_page":"1829"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/white","display_name":"White (mutation)","score":0.5603877305984497},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.5463583469390869},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5389273166656494},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5267007946968079},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.521967351436615},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5184206962585449},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.49697354435920715},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4672914147377014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.419096440076828},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.416822612285614},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20306381583213806},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.10365879535675049},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.07586154341697693}],"concepts":[{"id":"https://openalex.org/C56273599","wikidata":"https://www.wikidata.org/wiki/Q3122841","display_name":"White (mutation)","level":3,"score":0.5603877305984497},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.5463583469390869},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5389273166656494},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5267007946968079},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.521967351436615},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5184206962585449},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.49697354435920715},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4672914147377014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.419096440076828},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.416822612285614},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20306381583213806},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.10365879535675049},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.07586154341697693},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C107038049","wikidata":"https://www.wikidata.org/wiki/Q35986","display_name":"Aesthetics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2019.2910934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2910934","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1159062807","display_name":null,"funder_award_id":"BK20181394","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G4236343159","display_name":null,"funder_award_id":"61872192","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5488085843","display_name":null,"funder_award_id":"2017YFB0802500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W11078255","https://openalex.org/W1505973206","https://openalex.org/W1551572898","https://openalex.org/W1569083856","https://openalex.org/W1572375309","https://openalex.org/W1595979964","https://openalex.org/W1667889362","https://openalex.org/W1800919869","https://openalex.org/W1873852107","https://openalex.org/W1917830443","https://openalex.org/W1938099525","https://openalex.org/W1984462474","https://openalex.org/W2015388549","https://openalex.org/W2018300500","https://openalex.org/W2110697240","https://openalex.org/W2124167991","https://openalex.org/W2140514778","https://openalex.org/W2158328724","https://openalex.org/W2163114293","https://openalex.org/W2166462813","https://openalex.org/W2168130438","https://openalex.org/W2168454419","https://openalex.org/W2184904104","https://openalex.org/W2234839359","https://openalex.org/W2285907782","https://openalex.org/W2396670647","https://openalex.org/W2397423248","https://openalex.org/W2491381336","https://openalex.org/W2545565086","https://openalex.org/W2551407130","https://openalex.org/W2557103463","https://openalex.org/W2569709881","https://openalex.org/W2586046457","https://openalex.org/W2745191645","https://openalex.org/W2753865370","https://openalex.org/W2768348791","https://openalex.org/W2769200374","https://openalex.org/W2779269988","https://openalex.org/W2791603174","https://openalex.org/W2798267696","https://openalex.org/W2884455160","https://openalex.org/W2884658035","https://openalex.org/W2921721648","https://openalex.org/W2952368650","https://openalex.org/W6639321293","https://openalex.org/W6676380704","https://openalex.org/W6712228328","https://openalex.org/W6712237015","https://openalex.org/W6764789438"],"related_works":["https://openalex.org/W2606299826","https://openalex.org/W1975565534","https://openalex.org/W4296118134","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W1997751119","https://openalex.org/W1932157736","https://openalex.org/W2073654643","https://openalex.org/W2151838902","https://openalex.org/W2126213311"],"abstract_inverted_index":{"Digital":[0],"signature":[1,29],"schemes":[2,16,31,52],"have":[3,20,72],"been":[4,21],"extensively":[5],"studied":[6],"in":[7,80,132,180],"the":[8,63,66,76,85,90,114,122,128,136,141,154,167,170],"literature,":[9],"where":[10,182],"a":[11,35,101,173,183],"large":[12],"number":[13],"of":[14,50,65],"such":[15,112],"with":[17],"different":[18,24],"properties":[19],"designed":[22,56],"for":[23,57,89,104],"applications.":[25],"For":[26],"example,":[27],"identity-based":[28],"(IBS)":[30],"can":[32],"efficiently":[33],"map":[34],"user's":[36],"digital":[37],"public":[38],"key":[39,68,107,117,148],"to":[40,75,99],"his/her":[41],"real-world":[42],"identity":[43],"(e.g.,":[44,147],"e-mail":[45],"address).":[46],"However,":[47],"existing":[48],"implementations":[49],"IBS":[51,93,156],"are":[53],"not":[54],"generally":[55],"white-box":[58,87],"security":[59,129,139,185],"(WBS),":[60],"particularly":[61],"concerning":[62],"protection":[64],"private":[67,106,116],"when":[69],"special":[70,110],"attackers":[71],"full":[73],"access":[74],"execution":[77,123],"environment.":[78],"Therefore,":[79],"this":[81],"paper,":[82],"we":[83],"propose":[84],"first":[86,155],"implementation":[88,158,171],"classical":[91],"Shamir's":[92],"scheme.":[94],"The":[95],"basic":[96],"idea":[97],"is":[98,153,163,178,187],"utilize":[100],"mathematical":[102],"transformation":[103],"embedding":[105],"into":[108],"some":[109],"tables,":[111],"that":[113,159,169],"original":[115],"could":[118],"be":[119],"\u201cinvisible\u201d":[120],"during":[121],"process.":[124],"We":[125],"then":[126],"analyze":[127],"requirements":[130],"achieved":[131],"our":[133],"implementation,":[134],"including":[135],"conventional":[137],"black-box":[138],"under":[140],"random":[142],"oracle":[143],"model":[144],"and":[145],"WBS":[146],"recovery":[149],"attack":[150],"resilience).":[151],"This":[152],"scheme":[157],"satisfies":[160],"WBS.":[161],"It":[162],"also":[164],"shown":[165],"from":[166],"simulation":[168],"incurs":[172],"constant":[174],"computational":[175],"cost,":[176],"which":[177],"realistic":[179],"deployments":[181],"high":[184],"level":[186],"required.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
