{"id":"https://openalex.org/W2541793999","doi":"https://doi.org/10.1109/tifs.2016.2622682","title":"Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System","display_name":"Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System","publication_year":2016,"publication_date":"2016-10-27","ids":{"openalex":"https://openalex.org/W2541793999","doi":"https://doi.org/10.1109/tifs.2016.2622682","mag":"2541793999"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2622682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2622682","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Debiao He","raw_affiliation_strings":["State Key Laboratory of Cryptology, Beijing, China","State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]},{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["AU","CN","US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","School of Computer Science, China University of Geosciences, Wuhan, China","School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]},{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101586615","display_name":"Wei Wu","orcid":"https://orcid.org/0000-0001-6773-5245"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025668908"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":11.4851,"has_fulltext":false,"cited_by_count":87,"citation_normalized_percentile":{"value":0.98421929,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":"2","first_page":"454","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864828705787659},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6695629954338074},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6164349317550659},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5745850205421448},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5680012106895447},{"id":"https://openalex.org/keywords/automatic-dependent-surveillance-broadcast","display_name":"Automatic dependent surveillance-broadcast","score":0.5508973598480225},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49321430921554565},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.46107199788093567},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4186479449272156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3269573450088501},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32350826263427734},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28372499346733093},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17935234308242798},{"id":"https://openalex.org/keywords/air-traffic-control","display_name":"Air traffic control","score":0.12286132574081421},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09536731243133545}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864828705787659},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6695629954338074},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6164349317550659},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5745850205421448},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5680012106895447},{"id":"https://openalex.org/C183384803","wikidata":"https://www.wikidata.org/wiki/Q787172","display_name":"Automatic dependent surveillance-broadcast","level":3,"score":0.5508973598480225},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49321430921554565},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.46107199788093567},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4186479449272156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3269573450088501},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32350826263427734},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28372499346733093},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17935234308242798},{"id":"https://openalex.org/C166961238","wikidata":"https://www.wikidata.org/wiki/Q221395","display_name":"Air traffic control","level":2,"score":0.12286132574081421},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09536731243133545},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2622682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2622682","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2741281456","display_name":null,"funder_award_id":"2015CFB257","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G409005584","display_name":null,"funder_award_id":"61472083","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7567146671","display_name":null,"funder_award_id":"61402110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8895439857","display_name":null,"funder_award_id":"U1536204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1515073590","https://openalex.org/W1515791612","https://openalex.org/W1518169605","https://openalex.org/W1541704441","https://openalex.org/W1571249313","https://openalex.org/W1592092778","https://openalex.org/W1946476891","https://openalex.org/W1964860485","https://openalex.org/W1969988114","https://openalex.org/W1981647260","https://openalex.org/W1996412230","https://openalex.org/W2002134597","https://openalex.org/W2046153763","https://openalex.org/W2050437785","https://openalex.org/W2052476756","https://openalex.org/W2082586572","https://openalex.org/W2085555801","https://openalex.org/W2087937661","https://openalex.org/W2089255914","https://openalex.org/W2090297307","https://openalex.org/W2118756516","https://openalex.org/W2129184440","https://openalex.org/W2143899187","https://openalex.org/W2145255308","https://openalex.org/W2159099280","https://openalex.org/W2169194339","https://openalex.org/W2186548909","https://openalex.org/W2351871428","https://openalex.org/W2418861526","https://openalex.org/W2525841751","https://openalex.org/W2532504656","https://openalex.org/W2587276770","https://openalex.org/W3104706117","https://openalex.org/W3141342797","https://openalex.org/W6686936072","https://openalex.org/W6728522146","https://openalex.org/W6733324255"],"related_works":["https://openalex.org/W1527397996","https://openalex.org/W2067286885","https://openalex.org/W16894843","https://openalex.org/W1972982005","https://openalex.org/W2885499386","https://openalex.org/W1591954407","https://openalex.org/W2951515747","https://openalex.org/W3031215330","https://openalex.org/W2104321465","https://openalex.org/W4250384982"],"abstract_inverted_index":{"The":[0],"automatic-dependent":[1],"surveillance-broad-cast":[2],"(ADS-B)":[3],"is":[4,61],"generally":[5],"regarded":[6],"as":[7,103,105],"the":[8,54,58,80,93,110,125,148,165,170,177,180,188,195,199],"most":[9,28],"important":[10],"module":[11],"in":[12,27,79,169,202],"air":[13],"traffic":[14],"surveillance":[15],"technology.":[16],"To":[17,69],"obtain":[18],"better":[19],"airline":[20],"security,":[21],"ADS-B":[22,39,59,81,111,149,196],"system":[23,60,197],"will":[24,34],"be":[25,35],"deployed":[26],"airspace":[29],"by":[30,194],"2020,":[31],"where":[32],"aircraft":[33,47],"equipped":[36],"with":[37,100,144],"an":[38,140],"device":[40],"that":[41,187],"periodically":[42],"broadcasts":[43],"messages":[44,77],"to":[45,53,63,124],"other":[46],"and":[48,74,207],"ground":[49],"station":[50],"controllers.":[51],"Due":[52],"open":[55],"communication":[56],"environment,":[57],"subject":[62],"a":[64,87],"broad":[65],"range":[66],"of":[67,76,179],"attacks.":[68],"simultaneously":[70],"implement":[71],"both":[72],"integrity":[73],"authenticity":[75],"transmitted":[78],"system,":[82],"Yang":[83,208],"et":[84,204,209],"al.":[85],"proposed":[86],"new":[88],"authentication":[89],"frame":[90],"based":[91],"on":[92],"three-level":[94],"hierarchical":[95],"identity-based":[96],"signature":[97],"(TLHIBS)":[98],"scheme":[99,143,152,167,181,190,206],"batch":[101,145],"verification,":[102],"well":[104],"constructing":[106],"two":[107],"schemes":[108,116],"for":[109,120,127,147],"system.":[112,150],"However,":[113],"neither":[114],"TLHIBS":[115,142,166,189,211],"are":[117],"sufficiently":[118],"lightweight":[119],"practical":[121],"deployment":[122],"due":[123],"need":[126],"complex":[128],"hash-to-point":[129,156],"operation":[130,157],"or":[131,158],"expensive":[132],"certification":[133,160],"management.":[134,161],"In":[135],"this":[136],"paper,":[137],"we":[138],"construct":[139],"efficient":[141],"verification":[146],"Our":[151],"does":[153],"not":[154],"require":[155],"(expensive)":[159],"We":[162,174],"then":[163],"prove":[164],"secure":[168],"random":[171],"oracle":[172],"model.":[173],"also":[175],"demonstrate":[176],"practicality":[178],"using":[182],"experiments,":[183],"whose":[184],"findings":[185],"indicate":[186],"supports":[191],"attributes":[192],"required":[193],"without":[198],"computation":[200],"cost":[201],"Chow":[203],"al.'s":[205,210],"schemes.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":7}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
