{"id":"https://openalex.org/W7117673393","doi":"https://doi.org/10.1109/tnse.2025.3649720","title":"DVA-ACLF: Designated Verifier Asymmetric Anonymous Credential Scheme for Low-Altitude Flight","display_name":"DVA-ACLF: Designated Verifier Asymmetric Anonymous Credential Scheme for Low-Altitude Flight","publication_year":2025,"publication_date":"2025-12-31","ids":{"openalex":"https://openalex.org/W7117673393","doi":"https://doi.org/10.1109/tnse.2025.3649720"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2025.3649720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3649720","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023902836","display_name":"Biwen Chen","orcid":"https://orcid.org/0000-0002-7314-8271"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Biwen Chen","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121636160","display_name":"Qiuling Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuling Guan","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000447696","display_name":"Jia Yu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Li","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121632564","display_name":"Jing Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016904590","display_name":"Jialing He","orcid":"https://orcid.org/0000-0002-8643-0647"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialing He","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121628726","display_name":"Debiao He","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100631860","display_name":"Tao Xiang","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xiang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5023902836"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74404661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"5752","last_page":"5767"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.25949999690055847,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.25949999690055847,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.1509000062942505,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.10719999670982361,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.9825000166893005},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6753000020980835},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5069000124931335},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4771000146865845},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.4726000130176544},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.43779999017715454},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.34139999747276306}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.9825000166893005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7800999879837036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7164999842643738},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6753000020980835},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5069000124931335},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4771000146865845},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47679999470710754},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.4726000130176544},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.43779999017715454},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.34139999747276306},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3303000032901764},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3025999963283539},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2888999879360199},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.26570001244544983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3649720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3649720","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.8093230724334717,"display_name":"Sustainable cities and communities"}],"awards":[{"id":"https://openalex.org/G2018698635","display_name":null,"funder_award_id":"62472056","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4139590291","display_name":null,"funder_award_id":"62572208","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6130330936","display_name":null,"funder_award_id":"62572079","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":71,"referenced_works":["https://openalex.org/W1497439563","https://openalex.org/W1851031742","https://openalex.org/W1888254701","https://openalex.org/W1931152882","https://openalex.org/W1976816524","https://openalex.org/W2018541573","https://openalex.org/W2029758586","https://openalex.org/W2031618446","https://openalex.org/W2033820870","https://openalex.org/W2053342672","https://openalex.org/W2094557617","https://openalex.org/W2106332032","https://openalex.org/W2109657825","https://openalex.org/W2115772460","https://openalex.org/W2134244876","https://openalex.org/W2165210192","https://openalex.org/W2172174332","https://openalex.org/W2268751503","https://openalex.org/W2301424859","https://openalex.org/W2327622231","https://openalex.org/W2400148870","https://openalex.org/W2517225079","https://openalex.org/W2522615148","https://openalex.org/W2524824762","https://openalex.org/W2566527471","https://openalex.org/W2604830243","https://openalex.org/W2611626082","https://openalex.org/W2745151765","https://openalex.org/W2790487176","https://openalex.org/W2809215955","https://openalex.org/W2900400615","https://openalex.org/W2900477065","https://openalex.org/W2905628336","https://openalex.org/W2912120935","https://openalex.org/W2913105718","https://openalex.org/W2913840322","https://openalex.org/W2937840480","https://openalex.org/W2954700723","https://openalex.org/W2959686891","https://openalex.org/W2963874768","https://openalex.org/W2971756154","https://openalex.org/W2985126008","https://openalex.org/W3001321893","https://openalex.org/W3004062710","https://openalex.org/W3005527937","https://openalex.org/W3005766641","https://openalex.org/W3009951551","https://openalex.org/W3012182806","https://openalex.org/W3023178162","https://openalex.org/W3109364115","https://openalex.org/W3111927032","https://openalex.org/W3112926755","https://openalex.org/W3120131065","https://openalex.org/W3137452861","https://openalex.org/W3167014088","https://openalex.org/W4205092462","https://openalex.org/W4223962571","https://openalex.org/W4244821898","https://openalex.org/W4320015873","https://openalex.org/W4322768911","https://openalex.org/W4362686174","https://openalex.org/W4377007801","https://openalex.org/W4385405602","https://openalex.org/W4388857500","https://openalex.org/W4391724788","https://openalex.org/W4392928519","https://openalex.org/W4401726109","https://openalex.org/W4404238463","https://openalex.org/W4406946912","https://openalex.org/W4410358938","https://openalex.org/W4414270400"],"related_works":[],"abstract_inverted_index":{"Low-altitude":[0],"aerial":[1],"networks":[2,18],"play":[3],"an":[4,101],"increasingly":[5],"critical":[6],"role":[7],"in":[8,144,160,216],"urban":[9],"logistics,":[10],"emergency":[11],"response,":[12],"and":[13,28,37,63,66,127,146,162,170,190,213],"intelligent":[14],"airspace":[15],"management.":[16],"These":[17,203],"must":[19],"ensure":[20],"reliable":[21],"identity":[22,41],"authentication":[23,32,215],"while":[24],"addressing":[25],"privacy,":[26,58],"efficiency,":[27],"security":[29],"challenges.":[30],"Traditional":[31],"mechanisms\u2014such":[33],"as":[34],"PKI-based":[35],"certificates":[36],"remote":[38],"identification\u2014either":[39],"overexpose":[40],"data":[42],"or":[43],"lack":[44],"support":[45],"for":[46,89,97,210],"flexible":[47],"attribute":[48,113,157],"disclosure.":[49],"Moreover,":[50],"existing":[51],"anonymous":[52],"credential":[53,94,125,135,152],"(AC)":[54],"schemes,":[55],"though":[56],"offering":[57],"often":[59],"incur":[60],"high":[61],"computational":[62],"communication":[64],"costs":[65],"exist":[67],"vulnerable":[68],"to":[69,110,123,156],"replay":[70],"attacks.":[71],"To":[72],"address":[73],"these":[74],"limitations,":[75],"we":[76],"propose":[77],"<bold":[78],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[79,82,172,181,192],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">DVA-ACLF</b>":[80],"(<italic":[81],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Designated":[83],"Verifier":[84],"Asymmetric":[85],"Anonymous":[86],"Credential":[87],"Scheme":[88],"Low-Altitude":[90],"Flight</i>),":[91],"a":[92,207],"lightweight":[93],"system":[95],"tailored":[96],"UAVs.":[98],"DVA-ACLF":[99,133,206],"leverages":[100],"efficient":[102],"MAC-based":[103],"construction":[104],"combined":[105],"with":[106,154],"non-interactive":[107],"zero-knowledge":[108],"proofs":[109],"enable":[111],"selective":[112],"disclosure":[114],"without":[115],"relying":[116],"on":[117,177],"pairings.":[118],"It":[119,165],"supports":[120],"designated":[121],"verification":[122],"prevent":[124],"misuse":[126],"replay.":[128],"Experimental":[129],"results":[130],"show":[131],"that":[132],"reduces":[134],"size":[136,153],"by":[137],"49%":[138],"(2720":[139],"bits":[140,143],"vs.":[141],"5369":[142],"Idemix)":[145],"mitigates":[147],"the":[148,185,196],"linear":[149],"growth":[150],"of":[151,187,198],"respect":[155],"count":[158],"observed":[159],"CL":[161],"BBS+":[163],"schemes.":[164],"requires":[166],"only":[167],"four":[168],"single-base":[169],"<inline-formula":[171,180,191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[173,182,193],"notation=\"LaTeX\">$2(k-l)$</tex-math></inline-formula>":[174],"double-base":[175],"exponentiations":[176],"UAVs,":[178],"where":[179],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[183],"is":[184,195],"number":[186,197],"selected":[188],"attributes":[189],"notation=\"LaTeX\">$l$</tex-math></inline-formula>":[194],"disclosed":[199],"attributes\u2014both":[200],"typically":[201],"small.":[202],"features":[204],"make":[205],"strong":[208],"candidate":[209],"secure,":[211],"efficient,":[212],"privacy-preserving":[214],"low-altitude":[217],"flight":[218],"applications.":[219]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-31T00:00:00"}
