{"id":"https://openalex.org/W2022456291","doi":"https://doi.org/10.1109/lcn.2012.6423691","title":"Multi-resolution elliptic curve digital signature","display_name":"Multi-resolution elliptic curve digital signature","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2022456291","doi":"https://doi.org/10.1109/lcn.2012.6423691","mag":"2022456291"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2012.6423691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007690067","display_name":"Panoat Chuchaisri","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"P. Chuchaisri","raw_affiliation_strings":["Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA","Department of Computer and Information Science and Engineering, University of Florida, Gainseville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Computer and Information Science and Engineering, University of Florida, Gainseville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108370925","display_name":"Richard E. Newman","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. E. Newman","raw_affiliation_strings":["Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA","Department of Computer and Information Science and Engineering, University of Florida, Gainseville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Computer and Information Science and Engineering, University of Florida, Gainseville, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5007690067"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":2.1316,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.89960339,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"93","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.803149938583374},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7572999000549316},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7310396432876587},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6690055131912231},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5937358140945435},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5877949595451355},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5089173316955566},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5086292028427124},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.444698303937912},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4342902600765228},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33386093378067017},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32959693670272827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3029875159263611},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21295535564422607},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15678372979164124}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.803149938583374},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7572999000549316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7310396432876587},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6690055131912231},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5937358140945435},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5877949595451355},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5089173316955566},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5086292028427124},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.444698303937912},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4342902600765228},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33386093378067017},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32959693670272827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3029875159263611},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21295535564422607},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15678372979164124},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2012.6423691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W81704951","https://openalex.org/W1487958904","https://openalex.org/W1517364441","https://openalex.org/W1547407391","https://openalex.org/W1562630396","https://openalex.org/W1567573409","https://openalex.org/W1578321116","https://openalex.org/W1586025855","https://openalex.org/W1592109266","https://openalex.org/W1602086557","https://openalex.org/W1880212920","https://openalex.org/W1972810476","https://openalex.org/W2000698497","https://openalex.org/W2003736153","https://openalex.org/W2010174619","https://openalex.org/W2010514245","https://openalex.org/W2023064581","https://openalex.org/W2033751220","https://openalex.org/W2036378739","https://openalex.org/W2057405403","https://openalex.org/W2092667369","https://openalex.org/W2114000996","https://openalex.org/W2141420453","https://openalex.org/W2143833131","https://openalex.org/W2338121854","https://openalex.org/W2499636432","https://openalex.org/W4230653262","https://openalex.org/W4241580536","https://openalex.org/W6603394938","https://openalex.org/W6629356479","https://openalex.org/W6681423659"],"related_works":["https://openalex.org/W2782833818","https://openalex.org/W2130871907","https://openalex.org/W2360623194","https://openalex.org/W1565266559","https://openalex.org/W2037734447","https://openalex.org/W3191743943","https://openalex.org/W2633581358","https://openalex.org/W4255730851","https://openalex.org/W2186564849","https://openalex.org/W2111698159"],"abstract_inverted_index":{"Broadcast":[0],"authentication":[1,28],"mechanisms":[2],"are":[3,30,95,112],"essential":[4],"to":[5,43,59,143,178,191,223,229],"cyber-physical":[6],"systems":[7],"that":[8,137,172,230],"communicate":[9],"through":[10],"wireless":[11,15],"links":[12],"such":[13],"as":[14,76,78],"sensor":[16],"networks":[17],"(WSN)":[18],"and":[19,68,86,109,115,153,205],"body":[20],"area":[21],"network":[22],"(BAN).":[23],"Even":[24],"though":[25],"symmetric":[26],"key-based":[27,37],"schemes":[29,40],"more":[31],"prevalent":[32],"among":[33],"these":[34],"systems,":[35],"public":[36,110,187],"digital":[38,93,134,163],"signature":[39,94,135,164,234,245],"have":[41,50],"started":[42],"gain":[44],"ground;":[45],"notably,":[46],"several":[47],"research":[48],"efforts":[49],"been":[51],"focused":[52],"on":[53],"the":[54,98,101,118,139,174,176,185,211,232],"Elliptic":[55,168],"Curve":[56,169],"Cryptosystem":[57],"due":[58],"its":[60],"low":[61],"overheads.":[62],"As":[63],"a":[64,129,132,141,146,162,195,237,244],"combination":[65],"of":[66,89,100,181,197,213,231,243],"sensing":[67],"computing":[69],"platform,":[70],"WSN":[71],"must":[72],"handle":[73],"both":[74],"time-sensitive":[75],"well":[77],"delay-tolerant":[79],"but":[80,216],"security-sensitive":[81],"data.":[82],"The":[83,106],"cryptographic":[84],"strength":[85,148,241],"verification":[87,151],"delay":[88],"an":[90,192],"elliptic":[91,239],"curve":[92,240],"determined":[96],"by":[97],"parameters":[99,108],"curve's":[102],"underlying":[103],"finite":[104],"held.":[105],"held's":[107],"key":[111,188,208],"usually":[113],"generated":[114],"distributed":[116],"before":[117],"WSN's":[119],"deployment":[120],"thus":[121],"cannot":[122],"be":[123],"changed":[124],"easily.":[125],"This":[126],"situation":[127],"creates":[128],"need":[130],"for":[131,149],"multi-resolution":[133],"scheme":[136,165],"provides":[138],"signer":[140,175],"choice":[142],"trade":[144],"off":[145],"signature's":[147],"faster":[150],"time":[152],"less":[154,202],"power":[155],"consumption.":[156],"In":[157],"this":[158],"paper,":[159],"we":[160],"present":[161],"called":[166],"Multi-Resolution":[167],"Signature":[170],"(MRECS)":[171],"allows":[173],"ability":[177],"create":[179],"signatures":[180],"different":[182,198],"strengths":[183],"from":[184],"same":[186],"set.":[189],"Compared":[190],"implementation":[193],"using":[194],"set":[196],"keys,":[199],"MRECS":[200,220],"requires":[201],"storage":[203],"overhead":[204,226],"has":[206],"longer":[207],"lifetime":[209],"at":[210],"cost":[212],"slightly":[214],"higher":[215],"acceptable":[217],"communication":[218],"overhead.":[219],"yields":[221],"up":[222],"33%":[224],"computational":[225],"reduction":[227],"compared":[228],"full-size":[233],"while":[235],"maintaining":[236],"full":[238],"regardless":[242],"strength.":[246]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
