{"id":"https://openalex.org/W4385945509","doi":"https://doi.org/10.1109/tifs.2023.3306107","title":"Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments","display_name":"Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385945509","doi":"https://doi.org/10.1109/tifs.2023.3306107"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3306107","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3306107","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101971686","display_name":"Xiaotong Zhou","orcid":"https://orcid.org/0000-0002-4856-0627"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaotong Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, Matrix Elements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, Matrix Elements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101971686"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":3.6099,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.93806934,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"18","issue":null,"first_page":"5345","last_page":"5358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.8135866522789001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7891896963119507},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7093336582183838},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6345108151435852},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.525848925113678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39158520102500916},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3214966356754303},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.25000280141830444},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20229694247245789},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.095399409532547},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.09512543678283691}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.8135866522789001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7891896963119507},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7093336582183838},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6345108151435852},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.525848925113678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39158520102500916},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3214966356754303},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.25000280141830444},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20229694247245789},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.095399409532547},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09512543678283691}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3306107","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3306107","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-131686","is_oa":false,"landing_page_url":"https://repository.hkust.edu.hk/ir/Record/1783.1-131686","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G10506919","display_name":null,"funder_award_id":"62272350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2165423621","display_name":null,"funder_award_id":"2042023KF0203","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5497752695","display_name":null,"funder_award_id":"2021YFA1000600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1551392315","https://openalex.org/W1589034595","https://openalex.org/W1788452017","https://openalex.org/W2013613544","https://openalex.org/W2014239329","https://openalex.org/W2079913403","https://openalex.org/W2099000090","https://openalex.org/W2277195237","https://openalex.org/W2284345771","https://openalex.org/W2288007454","https://openalex.org/W2295677804","https://openalex.org/W2613637871","https://openalex.org/W2766140750","https://openalex.org/W2767101501","https://openalex.org/W2768423348","https://openalex.org/W2808221540","https://openalex.org/W2810807736","https://openalex.org/W2891853972","https://openalex.org/W2913157813","https://openalex.org/W2947736742","https://openalex.org/W2962718239","https://openalex.org/W2967051452","https://openalex.org/W2990561924","https://openalex.org/W3041566224","https://openalex.org/W3085980483","https://openalex.org/W3129015807","https://openalex.org/W3151344031","https://openalex.org/W3168667840","https://openalex.org/W3205542647","https://openalex.org/W4288057768","https://openalex.org/W4296959874","https://openalex.org/W6633138432","https://openalex.org/W6635298198","https://openalex.org/W6636797535","https://openalex.org/W6674864358","https://openalex.org/W6694395031","https://openalex.org/W6802886815"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2323391421","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W181049489","https://openalex.org/W3023219121"],"abstract_inverted_index":{"Despite":[0],"the":[1,71,74,80,112,126,138,182,211,220,228,246,257],"myriad":[2],"benefits":[3],"offered":[4],"by":[5,92],"blockchain":[6],"technology,":[7],"most":[8],"of":[9,67,115,128,153,223,230],"them":[10],"still":[11,77],"face":[12],"several":[13],"interrelated":[14],"issues,":[15],"such":[16,164],"as":[17,33,165],"limited":[18],"transaction":[19,22],"throughput,":[20],"exorbitant":[21],"fees,":[23],"and":[24,118,131,172,238],"protracted":[25],"confirmation":[26],"times.":[27],"Payment":[28],"channel":[29,243],"networks":[30],"have":[31],"emerged":[32],"a":[34,86,196,235,240],"promising":[35],"scalability":[36],"solution,":[37],"allowing":[38],"two":[39],"mutually":[40],"distrustful":[41],"users":[42],"to":[43,70,125,149,159,189,213],"engage":[44],"in":[45],"multiple":[46],"off-chain":[47],"transactions.":[48],"However,":[49],"existing":[50],"schemes":[51],"based":[52],"on":[53,79],"Hash":[54],"Time":[55],"Lock":[56,61],"Contract":[57],"or":[58],"Anonymous":[59],"Multi-hop":[60],"generally":[62],"cannot":[63,133],"ensure":[64],"strong":[65],"unlinkability":[66],"payments,":[68],"due":[69],"fact":[72],"that":[73,250],"time-lock":[75],"information":[76],"remains":[78],"blockchain.":[81],"To":[82,179],"enhance":[83,160],"on-chain":[84],"privacy,":[85],"versatile":[87],"tool":[88],"was":[89],"recently":[90],"proposed":[91],"Thyagarajan":[93],"et":[94],"al.":[95],"(":[96,167,174],"<italic":[97,102,168,175,186,190,201],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[98,103,169,176,187,191,202,216],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">CCS\u201920</i>":[99],"),":[100],"named":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Verifiable":[104,203],"Timed":[105,204],"Signatures</i>":[106,206],",":[107],"but":[108],"it":[109],"suffers":[110],"from":[111,185],"dual":[113],"insufficiencies":[114],"linear-increasing":[116],"performance":[117,122,255],"time":[119],"unverifiability":[120],"(i.e.,":[121],"is":[123],"linear":[124],"number":[127],"signature":[129],"shares,":[130],"signatures":[132],"be":[134,157],"ensured":[135],"recoverable":[136],"after":[137],"specified":[139],"time).":[140],"In":[141],"this":[142],"paper,":[143],"we":[144,194,209],"first":[145],"propose":[146],"an":[147],"approach":[148],"reduce":[150,181],"computational":[151,183],"overhead":[152],"VTS,":[154],"which":[155,218],"can":[156],"applied":[158],"other":[161],"established":[162],"schemes,":[163],"VTD":[166],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">S&amp;P\u201922</i>":[170],")":[171],"VTLRS":[173],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ESORICS\u201922</i>":[177],").":[178],"further":[180],"complexity":[184],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O(n)</i>":[188],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>":[192],"(1),":[193],"introduce":[195],"new":[197],"cryptographic":[198],"primitive":[199],"called":[200],"Adaptor":[205],".":[207],"Moreover,":[208],"extend":[210],"VTAS":[212,214],"<sup":[215],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">+</sup>":[217],"provides":[219],"security":[221],"property":[222],"verifiable":[224],"recovery.":[225],"We":[226],"demonstrate":[227],"practicality":[229],"our":[231,251],"proposal":[232],"via":[233],"presenting":[234],"concrete":[236],"instantiation":[237],"constructing":[239],"privacy-enhanced":[241],"payment":[242],"network.":[244],"Finally,":[245],"comprehensive":[247],"evaluation":[248],"reveals":[249],"solutions":[252],"exhibit":[253],"superior":[254],"than":[256],"state-of-the-art":[258],"schemes.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
