{"id":"https://openalex.org/W4386590097","doi":"https://doi.org/10.1109/tdsc.2023.3314019","title":"Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures","display_name":"Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures","publication_year":2023,"publication_date":"2023-09-11","ids":{"openalex":"https://openalex.org/W4386590097","doi":"https://doi.org/10.1109/tdsc.2023.3314019"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3314019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3314019","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/9532","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008367202","display_name":"Rui Shi","orcid":"https://orcid.org/0000-0002-3489-2110"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui Shi","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100397670","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0002-7891-2670"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Yang","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045050946","display_name":"Yingjiu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I181233156","display_name":"University of Oregon","ror":"https://ror.org/0293rh119","country_code":"US","type":"education","lineage":["https://openalex.org/I181233156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingjiu Li","raw_affiliation_strings":["Department of Computer and Information Science, University of Oregon, Eugene, OR, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Oregon, Eugene, OR, USA","institution_ids":["https://openalex.org/I181233156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101473164","display_name":"Huamin Feng","orcid":"https://orcid.org/0009-0008-3469-8802"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huamin Feng","raw_affiliation_strings":["Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101710266","display_name":"Guozhen Shi","orcid":"https://orcid.org/0000-0003-4044-6210"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhen Shi","raw_affiliation_strings":["Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072606049","display_name":"HweeHwa Pang","orcid":"https://orcid.org/0000-0001-7266-5712"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hwee Hwa Pang","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5008367202"],"corresponding_institution_ids":["https://openalex.org/I202334528","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":1.2156,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83467215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"21","issue":"4","first_page":"2585","last_page":"2602"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/issuer","display_name":"Issuer","score":0.9438399076461792},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.7370794415473938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6206173300743103},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5033649802207947},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5015015602111816},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4030068814754486},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4023659825325012},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.39513352513313293},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14250397682189941},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08734539151191711}],"concepts":[{"id":"https://openalex.org/C138170105","wikidata":"https://www.wikidata.org/wiki/Q1337949","display_name":"Issuer","level":2,"score":0.9438399076461792},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.7370794415473938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6206173300743103},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5033649802207947},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5015015602111816},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4030068814754486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4023659825325012},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.39513352513313293},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14250397682189941},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08734539151191711},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2023.3314019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3314019","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-10532","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/9532","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2023.3314019","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-10532","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/9532","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2023.3314019","raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2447469041","display_name":null,"funder_award_id":"62372110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321048","display_name":"AXA Research Fund","ror":"https://ror.org/02zxqxw53"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W4220913602","https://openalex.org/W841377620","https://openalex.org/W2126037447","https://openalex.org/W2888183313","https://openalex.org/W4243688874","https://openalex.org/W4252709806","https://openalex.org/W2081673223","https://openalex.org/W2154930424"],"abstract_inverted_index":{"Attribute-based":[0],"anonymous":[1],"credentials":[2,19,46,78,99,110],"offer":[3],"users":[4,38,106],"fine-grained":[5],"access":[6],"control":[7],"in":[8,13,39],"a":[9,17,44,93,101,123,143,147,153,171],"privacy-preserving":[10],"manner.":[11],"However,":[12],"such":[14],"schemes":[15],"obtaining":[16],"user's":[18,45,59],"requires":[20,48],"knowledge":[21,50],"of":[22,51,65,74,103,113,134],"the":[23,30,49,58,72,114,135],"issuer's":[24,31,52],"public":[25,53],"key,":[26,54],"which":[27,55,118,140,174],"obviously":[28],"reveals":[29],"identity":[32],"that":[33,127],"must":[34],"be":[35],"hidden":[36],"from":[37,62,111],"certain":[40],"scenarios.":[41],"Moreover,":[42],"verifying":[43],"also":[47],"may":[56],"infer":[57],"private":[60],"information":[61],"their":[63,128],"choice":[64],"issuer.":[66],"In":[67,90],"this":[68],"paper,":[69],"we":[70,175],"introduce":[71],"notion":[73],"double":[75],"issuer-hiding":[76],"attribute-based":[77,109],"(":[79],"<inline-formula":[80,157],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[81,158,178],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math>${\\sf":[82,159],"DIHAC}$</tex-math></inline-formula>":[83,160],")":[84],"to":[85,142,204],"tackle":[86],"these":[87],"two":[88],"problems.":[89],"our":[91],"model,":[92],"central":[94],"authority":[95],"can":[96,107,125],"issue":[97],"public-key":[98],"for":[100,156],"group":[102],"issuers,":[104],"and":[105,170,200],"obtain":[108],"one":[112,119,133,141],"issuers":[115,137],"without":[116,138,188],"knowing":[117],"it":[120],"is.":[121],"Then,":[122],"user":[124],"prove":[126],"credential":[129],"was":[130],"issued":[131],"by":[132],"authenticated":[136],"revealing":[139],"verifier.":[144],"We":[145,193],"provide":[146,194],"generic":[148],"construction,":[149],"as":[150,152],"well":[151],"concrete":[154],"instantiation":[155],"based":[161],"on":[162,165,190,197],"structure-preserving":[163],"signatures":[164],"equivalence":[166],"classes":[167],"(JOC's":[168],"19)":[169],"novel":[172],"primitive":[173],"call":[176],"<italic":[177],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">tag-based":[179],"aggregatable":[180],"mercurial":[181],"signatures</i>":[182],".":[183],"Our":[184],"construction":[185],"is":[186],"efficient":[187],"relying":[189],"zero-knowledge":[191],"proofs.":[192],"rigorous":[195],"evaluations":[196],"personal":[198],"laptop":[199],"smartphone":[201],"platforms,":[202],"respectively,":[203],"demonstrate":[205],"its":[206],"practicability.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
