{"id":"https://openalex.org/W2626342296","doi":"https://doi.org/10.1109/smartcomp.2017.7946989","title":"Anonymous Authentication Scheme with Decentralized Multi-Authorities","display_name":"Anonymous Authentication Scheme with Decentralized Multi-Authorities","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2626342296","doi":"https://doi.org/10.1109/smartcomp.2017.7946989","mag":"2626342296"},"language":"en","primary_location":{"id":"doi:10.1109/smartcomp.2017.7946989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartcomp.2017.7946989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Computing (SMARTCOMP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035258118","display_name":"Hiroaki Anada","orcid":"https://orcid.org/0000-0002-4472-0662"},"institutions":[{"id":"https://openalex.org/I132400726","display_name":"University of Nagasaki","ror":"https://ror.org/03ppx1p25","country_code":"JP","type":"education","lineage":["https://openalex.org/I132400726"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hiroaki Anada","raw_affiliation_strings":["Department of Information Security, University of Nagasaki, Nagasaki, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, University of Nagasaki, Nagasaki, Japan","institution_ids":["https://openalex.org/I132400726"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113873046","display_name":"Seiko Arita","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Seiko Arita","raw_affiliation_strings":["Graduate School of Information Security, Institute of Information Security, Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Institute of Information Security, Yokohama, Japan","institution_ids":["https://openalex.org/I4210138172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035258118"],"corresponding_institution_ids":["https://openalex.org/I132400726"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60562585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2016","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.7522200345993042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6869021058082581},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6155325770378113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.600775420665741},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.5677784085273743},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5584431886672974},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5336374044418335},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4709635376930237},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.4114038944244385},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3997640609741211},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3159841299057007},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2351684272289276},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1770225465297699}],"concepts":[{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.7522200345993042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869021058082581},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6155325770378113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.600775420665741},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.5677784085273743},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5584431886672974},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5336374044418335},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4709635376930237},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.4114038944244385},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3997640609741211},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3159841299057007},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2351684272289276},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1770225465297699},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartcomp.2017.7946989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartcomp.2017.7946989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Computing (SMARTCOMP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W14130453","https://openalex.org/W1484557542","https://openalex.org/W1512460175","https://openalex.org/W1527414074","https://openalex.org/W1554259298","https://openalex.org/W1885156594","https://openalex.org/W2000609055","https://openalex.org/W2141395382","https://openalex.org/W2142968417","https://openalex.org/W2167496998","https://openalex.org/W2182997073","https://openalex.org/W2295240905","https://openalex.org/W2574326723","https://openalex.org/W2612647446","https://openalex.org/W6633307866","https://openalex.org/W6639610839"],"related_works":["https://openalex.org/W2363815311","https://openalex.org/W2365810850","https://openalex.org/W3093838961","https://openalex.org/W2365560704","https://openalex.org/W1721504835","https://openalex.org/W1534388293","https://openalex.org/W2330798352","https://openalex.org/W2022961789","https://openalex.org/W3110590623","https://openalex.org/W3107046201"],"abstract_inverted_index":{"We":[0],"propose":[1],"an":[2,62,76],"anonymous":[3,63,77],"authentication":[4,64,78],"scheme":[5,65,79,90,95,109,138,148],"with":[6,66,153],"a":[7,23,49,73],"feature":[8],"that":[9,38],"more":[10],"than":[11],"one":[12],"authorities":[13],"such":[14,67],"as":[15,96],"license":[16],"issuers":[17],"or":[18],"product":[19],"providers":[20],"can":[21],"admit":[22],"single":[24,121],"entity":[25,33],"by":[26,85],"issuing":[27],"secret":[28,42,116],"keys,":[29],"and":[30,57,91,125,145],"then":[31],"the":[32,55,58,81,87,92,104,111,120,123,126],"is":[34,39,149],"able":[35],"to":[36,45,119],"prove":[37,101],"has":[40],"those":[41],"keys":[43,117],"associated":[44,118],"its":[46],"identity,":[47,122],"without":[48],"central":[50],"authority.":[51],"First,":[52],"we":[53,71,100],"provide":[54],"syntax":[56],"security":[59,127],"definition":[60],"of":[61,75,114,131,136],"decentralized":[68],"multi-authorities.":[69],"Next,":[70],"give":[72],"construction":[74],"in":[80],"discrete":[82,105],"logarithm":[83,106],"setting":[84],"using":[86],"Okamoto":[88],"identification":[89],"Pedersen":[93],"commitment":[94],"building":[97],"blocks.":[98],"Then":[99],"that,":[102],"under":[103],"assumption,":[107],"our":[108,137,147],"possesses":[110],"proving":[112],"ability":[113],"knowing":[115],"anonymity,":[124],"against":[128],"concurrent":[129],"attacks":[130],"causing":[132],"misauthentication.":[133],"The":[134],"algorithm":[135],"does":[139],"not":[140],"need":[141],"costly":[142],"pairing":[143],"computation,":[144],"hence":[146],"suitable":[150],"for":[151],"devices":[152],"less":[154],"computational":[155],"resource.":[156]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
