{"id":"https://openalex.org/W4390805541","doi":"https://doi.org/10.1109/tifs.2024.3353074","title":"Quantum-Safe Puncturable Signatures With Their Application in Blockchain","display_name":"Quantum-Safe Puncturable Signatures With Their Application in Blockchain","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4390805541","doi":"https://doi.org/10.1109/tifs.2024.3353074"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3353074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3353074","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056536691","display_name":"Mei Jiang","orcid":"https://orcid.org/0000-0002-3184-3209"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mei Jiang","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038699052","display_name":"Yannan Li","orcid":"https://orcid.org/0000-0002-4407-9027"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yannan Li","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077617378","display_name":"Dung Hoang Duong","orcid":"https://orcid.org/0000-0001-8057-4060"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dung Duong","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056536691"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":3.637,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93302853,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"2761","last_page":"2770"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8316088914871216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7017070651054382},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6257173418998718},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6180791854858398},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.615828812122345},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5436477065086365},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4986457824707031},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.45909059047698975},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4364871680736542},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42894062399864197},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.2061920166015625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17367956042289734}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8316088914871216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7017070651054382},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6257173418998718},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6180791854858398},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.615828812122345},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5436477065086365},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4986457824707031},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.45909059047698975},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4364871680736542},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42894062399864197},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2061920166015625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17367956042289734},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2024.3353074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3353074","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-16325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/TIFS.2024.3353074","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Harvesting Series","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G8065364385","display_name":null,"funder_award_id":"DP240100017","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320320969","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W39036742","https://openalex.org/W56544557","https://openalex.org/W74973629","https://openalex.org/W80562455","https://openalex.org/W288529411","https://openalex.org/W1499766499","https://openalex.org/W1766548092","https://openalex.org/W1839785783","https://openalex.org/W1994790157","https://openalex.org/W2007466965","https://openalex.org/W2038761522","https://openalex.org/W2071676384","https://openalex.org/W2113717903","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2142048307","https://openalex.org/W2470451304","https://openalex.org/W2751076246","https://openalex.org/W2768714820","https://openalex.org/W2916931547","https://openalex.org/W2979191315","https://openalex.org/W4296960038"],"related_works":["https://openalex.org/W4387407403","https://openalex.org/W4249541918","https://openalex.org/W2390942931","https://openalex.org/W2899118713","https://openalex.org/W1988600149","https://openalex.org/W3128652783","https://openalex.org/W4255730851","https://openalex.org/W2149234266","https://openalex.org/W2130871907","https://openalex.org/W1981680180"],"abstract_inverted_index":{"Energy-efficient":[0],"proof-of-stake":[1],"(PoS)":[2],"consensus":[3],"protocols":[4,21],"in":[5,27,165],"blockchain":[6],"have":[7,22],"gained":[8],"much":[9],"attention":[10],"from":[11,100,139],"academia":[12],"and":[13,132],"industry":[14],"recently.":[15],"Despite":[16],"their":[17],"potential":[18],"advantages,":[19],"PoS":[20,116],"not":[23],"been":[24],"extensively":[25],"deployed":[26],"the":[28,48,80,88,94,103,159,166],"existing":[29,95],"digital":[30],"currency":[31],"market":[32],"due":[33,69],"to":[34,46,70,127],"inherent":[35],"security":[36],"concerns,":[37],"e.g.,":[38],"long-range":[39,67],"attacks.":[40],"Such":[41],"attacks":[42,68],"enable":[43],"an":[44,63],"adversary":[45],"rewrite":[47],"entire":[49],"transaction":[50],"history":[51],"of":[52],"a":[53,76,124,134,146],"blockchain,":[54],"severely":[55],"compromising":[56],"its":[57],"immutability.":[58],"The":[59],"puncturable":[60,96,136,148],"signature":[61,97,137,149],"provides":[62],"efficient":[64],"solution":[65,162],"against":[66],"secret":[71,81],"key":[72,82,90,105,109,129],"leakage.":[73],"More":[74],"specifically,":[75],"signer":[77],"can":[78],"update":[79],"with":[83],"chosen":[84],"messages":[85],"selectively,":[86],"while":[87],"public":[89,104],"is":[91,154],"unchanged.":[92],"Unfortunately,":[93],"schemes":[98],"suffer":[99],"either":[101],"updating":[102],"repeatedly":[106],"or":[107],"large":[108],"size,":[110],"which":[111],"makes":[112],"them":[113],"unsuitable":[114],"for":[115],"protocols.":[117],"To":[118],"resolve":[119],"these":[120],"drawbacks,":[121],"we":[122],"adopt":[123],"different":[125],"approach":[126],"performing":[128],"puncture":[130],"operations":[131],"propose":[133],"generic":[135],"construction":[138],"delegated":[140],"(key-policy)":[141],"constrained":[142],"signatures.":[143],"We":[144],"present":[145],"concrete":[147],"scheme":[150],"over":[151],"lattices":[152],"that":[153],"proven":[155],"secure":[156],"based":[157],"on":[158],"short":[160],"integer":[161],"(SIS)":[163],"assumption":[164],"standard":[167],"model.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
