{"id":"https://openalex.org/W7080301335","doi":"https://doi.org/10.1109/tifs.2025.3607250","title":"Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing","display_name":"Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7080301335","doi":"https://doi.org/10.1109/tifs.2025.3607250"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3607250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607250","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Meng Li","orcid":"https://orcid.org/0000-0003-3553-0813"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Li","raw_affiliation_strings":["Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-3553-0813","affiliations":[{"raw_affiliation_string":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hanni Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanni Ding","raw_affiliation_strings":["Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yifei Chen","orcid":"https://orcid.org/0000-0002-5256-3249"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifei Chen","raw_affiliation_strings":["Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-5256-3249","affiliations":[{"raw_affiliation_string":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yan Qiao","orcid":"https://orcid.org/0000-0002-4407-1762"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Qiao","raw_affiliation_strings":["Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-4407-1762","affiliations":[{"raw_affiliation_string":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zijian Zhang","orcid":"https://orcid.org/0000-0002-6313-4407"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijian Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6313-4407","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3277-3887","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mauro Conti","orcid":null},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["Department of Mathematics and the HIT Center, University of Padua, Padua, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics and the HIT Center, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49205532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"9477","last_page":"9491"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6985999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6985999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.028599999845027924,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.015599999576807022,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7009999752044678},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6280999779701233},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5873000025749207},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5708000063896179},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.5649999976158142},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5529000163078308},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.49950000643730164},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4609000086784363},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.43849998712539673}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814300000667572},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7009999752044678},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6280999779701233},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5873000025749207},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5708000063896179},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5702999830245972},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.5649999976158142},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5529000163078308},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.49950000643730164},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4609000086784363},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.43849998712539673},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.4372999966144562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40149998664855957},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38999998569488525},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.3718000054359436},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3709999918937683},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.33309999108314514},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.33000001311302185},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.32190001010894775},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.304500013589859},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3005000054836273},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.29589998722076416},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.2930000126361847},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.28049999475479126},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27880001068115234}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3607250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607250","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3523289881","display_name":null,"funder_award_id":"2508085MF151","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3537770290","display_name":null,"funder_award_id":"62372149","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4365675440","display_name":null,"funder_award_id":"U23A20303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7042574214","display_name":null,"funder_award_id":"62572168","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1588312749","https://openalex.org/W1589034595","https://openalex.org/W1600823322","https://openalex.org/W1601379374","https://openalex.org/W1608485164","https://openalex.org/W1752398301","https://openalex.org/W1885156594","https://openalex.org/W2085344582","https://openalex.org/W2105807578","https://openalex.org/W2108834246","https://openalex.org/W2134651419","https://openalex.org/W2141870382","https://openalex.org/W2167882086","https://openalex.org/W2320470009","https://openalex.org/W2768423348","https://openalex.org/W2904351506","https://openalex.org/W2912577494","https://openalex.org/W2913157813","https://openalex.org/W2967051452","https://openalex.org/W2987486320","https://openalex.org/W2989937780","https://openalex.org/W3035046430","https://openalex.org/W3041566224","https://openalex.org/W3052413922","https://openalex.org/W3215982604","https://openalex.org/W4206828612","https://openalex.org/W4285818103","https://openalex.org/W4308642224","https://openalex.org/W4311165445","https://openalex.org/W4312551118","https://openalex.org/W4387319322","https://openalex.org/W4390357301","https://openalex.org/W4400665532","https://openalex.org/W4401753452","https://openalex.org/W4405717558"],"related_works":[],"abstract_inverted_index":{"Threshold":[0],"Signature":[1,20],"(TS)":[2],"is":[3],"one":[4],"of":[5,41,152,176],"the":[6,39,88,103,115,129,185],"fundamental":[7],"cryptographic":[8],"primitives":[9],"adopted":[10],"in":[11],"many":[12],"practical":[13],"applications.":[14],"Current":[15],"Threshold,":[16],"Accountable,":[17],"and":[18,29,44,57,96,131,141,146,164],"Private":[19],"(TAPS)":[21],"schemes":[22],"suffer":[23],"from":[24,49,54,158],"delayed":[25],"combining,":[26,28],"unverifiable":[27],"message-independent":[30],"tracing.":[31,126],"More":[32],"precisely,":[33],"a":[34,71,77,138,150,173],"malicious":[35],"combiner":[36],"may":[37],"delay":[38],"combination":[40],"signature":[42,47,105,170],"shares":[43,48],"replace":[45],"some":[46],"honest":[50],"signers":[51],"with":[52,106,118,172],"ones":[53],"colluding":[55],"signers,":[56],"an":[58,119],"unrestricted":[59],"tracer":[60],"can":[61],"reveal":[62],"signers\u2019":[63],"identities":[64],"arbitrarily.":[65],"In":[66],"this":[67],"work,":[68],"we":[69,82,101,113,136],"introduce":[70],"new":[72],"scheme":[73],"called":[74],"TiMTAPS":[75,153],"under":[76],"stronger":[78],"security":[79],"model.":[80],"First,":[81],"sew":[83],"homomorphic":[84,107],"time-lock":[85],"puzzles":[86,92],"into":[87],"Schnorr":[89,104],"signature,":[90],"allowing":[91],"to":[93],"be":[94],"combined":[95],"opened":[97],"as":[98],"needed.":[99],"Second,":[100],"knit":[102],"commitment":[108],"for":[109,124,133,184],"verifiable":[110],"combining.":[111],"Third,":[112],"infuse":[114],"combining":[116,167],"phase":[117],"identity-based":[120],"key":[121],"encapsulation":[122],"mechanism":[123],"message-dependent":[125],"Next,":[127],"formalize":[128],"definitions":[130],"requirements":[132],"TiMTAPS.":[134],"Then,":[135],"present":[137],"concrete":[139],"construction":[140],"formally":[142],"prove":[143],"its":[144,162],"privacy":[145],"security.":[147],"We":[148],"build":[149],"prototype":[151],"based":[154],"on":[155],"Ethereum.":[156],"Results":[157],"extensive":[159],"experiments":[160],"exhibit":[161],"practicability":[163],"efficiency,":[165],"e.g.,":[166],"(tracking)":[168],"10":[169],"sets":[171],"threshold":[174,186],"value":[175],"5":[177],"requires":[178],"only":[179],"3.72":[180],"s":[181],"(12.44":[182],"s)":[183],"signature.":[187]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
