{"id":"https://openalex.org/W2136742813","doi":"https://doi.org/10.1109/bmei.2009.5305725","title":"A New ID-Based Deniable Ring Authentication with Constant-Size Signature","display_name":"A New ID-Based Deniable Ring Authentication with Constant-Size Signature","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2136742813","doi":"https://doi.org/10.1109/bmei.2009.5305725","mag":"2136742813"},"language":"en","primary_location":{"id":"doi:10.1109/bmei.2009.5305725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2009.5305725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 2nd International Conference on Biomedical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014548453","display_name":"Chengyu Hu","orcid":"https://orcid.org/0000-0001-8226-5747"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengyu Hu","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University, Jinan, China","School of Computer Science and Technology, Shandong University, Jinan, China#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Jinan, China#TAB#","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101656878","display_name":"Pengtao Liu","orcid":"https://orcid.org/0000-0002-6842-3689"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengtao Liu","raw_affiliation_strings":["Institute of Information Science and Technology, Shandong University of Political Science, Jinan, China","[Institute of Information Science and Technology, Shandong University of Political Science and Law, Jinan, China]"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science and Technology, Shandong University of Political Science, Jinan, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"[Institute of Information Science and Technology, Shandong University of Political Science and Law, Jinan, China]","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014548453"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13179508,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2442","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10304","display_name":"Geometric and Algebraic Topology","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.7546544075012207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6782264113426208},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.558332622051239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.535347044467926},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5048468708992004},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5042320489883423},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4766988456249237},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3762056231498718},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1761447787284851},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.12138336896896362}],"concepts":[{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.7546544075012207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6782264113426208},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.558332622051239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.535347044467926},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5048468708992004},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5042320489883423},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4766988456249237},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3762056231498718},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1761447787284851},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.12138336896896362},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bmei.2009.5305725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2009.5305725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 2nd International Conference on Biomedical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W143651745","https://openalex.org/W1482005385","https://openalex.org/W1484826441","https://openalex.org/W1595974665","https://openalex.org/W1602290867","https://openalex.org/W2017452737","https://openalex.org/W2105844506","https://openalex.org/W2111310412","https://openalex.org/W2129483619","https://openalex.org/W2376862417","https://openalex.org/W3029304757","https://openalex.org/W4285719527","https://openalex.org/W6628803625","https://openalex.org/W6628955194","https://openalex.org/W6635696793","https://openalex.org/W6636120072"],"related_works":["https://openalex.org/W2606299826","https://openalex.org/W1975565534","https://openalex.org/W4296118134","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W1997751119","https://openalex.org/W1932157736","https://openalex.org/W2073654643","https://openalex.org/W1981680180","https://openalex.org/W2104321465"],"abstract_inverted_index":{"Ring":[0],"signatures":[1],"allow":[2],"a":[3,11,29,39,122],"signer":[4],"in":[5,109],"an":[6,32,116,135],"ad-hoc":[7,33],"group":[8,17],"to":[9,37],"authenticate":[10,38],"message":[12,40,58],"on":[13,79,138],"behalf":[14],"of":[15,31,35,65,68,70,82,92],"the":[16,24,47,50,66,71,80,83,90,93,103],"without":[18,41],"revealing":[19,42],"which":[20,43,85,133],"member":[21,30,44],"actually":[22],"produced":[23],"signature.Deniable":[25],"ring":[26,74,84,94,126],"authentication":[27,75,127],"allows":[28],"sunset":[34],"participants":[36],"has":[45,110],"issued":[46],"signature,":[48],"and":[49],"verifier":[51],"cannot":[52],"convince":[53],"any":[54],"third":[55],"party":[56],"that":[57,102],"m":[59],"was":[60],"indeed":[61],"authenticated.":[62],"The":[63],"size":[64,81,91,131],"signature":[67,107,132],"most":[69],"proposed":[72,108],"deniable":[73,125],"schemes":[76],"is":[77,95],"dependent":[78],"causes":[86],"inefficiency":[87],"especially":[88],"when":[89],"large.":[96],"In":[97],"this":[98],"paper,":[99],"we":[100,120],"show":[101],"scheme":[104,128],"with":[105,129],"constant-size":[106],"some":[111],"security":[112],"problems":[113],"by":[114],"using":[115],"insecure":[117],"accumulator.":[118],"Then":[119],"propose":[121],"new":[123],"id-based":[124],"constant":[130],"uses":[134],"improved":[136],"accumulators":[137],"bilinear":[139],"pairings.":[140]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
