{"id":"https://openalex.org/W2111675323","doi":"https://doi.org/10.1109/bmei.2009.5305820","title":"Two Constructions of Fuzzy Identity Based Signature","display_name":"Two Constructions of Fuzzy Identity Based Signature","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2111675323","doi":"https://doi.org/10.1109/bmei.2009.5305820","mag":"2111675323"},"language":"en","primary_location":{"id":"doi:10.1109/bmei.2009.5305820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2009.5305820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 2nd International Conference on Biomedical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101744715","display_name":"Changji Wang","orcid":"https://orcid.org/0000-0003-2988-4404"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang-ji Wang","raw_affiliation_strings":["Department of Computer Science, Guangdong Province Information Security Key Laboratory, Laboratory of Digital Life, Ministry of Education, Sun Yat-sen University, Guangzhou, China","Dept. of Computer Science, Sun Yat-Sen University, Guangzhou, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Guangdong Province Information Security Key Laboratory, Laboratory of Digital Life, Ministry of Education, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Dept. of Computer Science, Sun Yat-Sen University, Guangzhou, China#TAB#","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100415610","display_name":"Jihong Kim","orcid":"https://orcid.org/0000-0002-4077-2932"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210107562","display_name":"Semyung University","ror":"https://ror.org/01d100w34","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210107562"]}],"countries":["CN","KR"],"is_corresponding":false,"raw_author_name":"Ji-Hong Kim","raw_affiliation_strings":["Department of Computer Science, Guangdong Province Information Security Key Laboratory, Laboratory of Digital Life, Ministry of Education, Sun Yat-sen University, Guangzhou, China","Deptartment of Inf. Security, Semyung Univ., Jecheon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Guangdong Province Information Security Key Laboratory, Laboratory of Digital Life, Ministry of Education, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Deptartment of Inf. Security, Semyung Univ., Jecheon, South Korea","institution_ids":["https://openalex.org/I4210107562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101744715"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":1.7447,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87363587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"196","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6496326923370361},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6155036687850952},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5839797258377075},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5724912285804749},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5035154223442078},{"id":"https://openalex.org/keywords/fuzzy-set-operations","display_name":"Fuzzy set operations","score":0.4926155209541321},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.470661997795105},{"id":"https://openalex.org/keywords/defuzzification","display_name":"Defuzzification","score":0.45712536573410034},{"id":"https://openalex.org/keywords/fuzzy-number","display_name":"Fuzzy number","score":0.45256027579307556},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44590508937835693},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4263197183609009},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34311601519584656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34122613072395325},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3065098524093628},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2854486107826233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13337233662605286}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6496326923370361},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6155036687850952},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5839797258377075},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5724912285804749},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5035154223442078},{"id":"https://openalex.org/C148671577","wikidata":"https://www.wikidata.org/wiki/Q5511133","display_name":"Fuzzy set operations","level":4,"score":0.4926155209541321},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.470661997795105},{"id":"https://openalex.org/C170260401","wikidata":"https://www.wikidata.org/wiki/Q5251735","display_name":"Defuzzification","level":5,"score":0.45712536573410034},{"id":"https://openalex.org/C1883856","wikidata":"https://www.wikidata.org/wiki/Q3407463","display_name":"Fuzzy number","level":4,"score":0.45256027579307556},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44590508937835693},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4263197183609009},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34311601519584656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34122613072395325},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3065098524093628},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2854486107826233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13337233662605286},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bmei.2009.5305820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2009.5305820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 2nd International Conference on Biomedical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1592092778","https://openalex.org/W1643928249","https://openalex.org/W1965387389","https://openalex.org/W2074594718","https://openalex.org/W2098983148","https://openalex.org/W2101709669","https://openalex.org/W2138001464","https://openalex.org/W2141420453","https://openalex.org/W2152924492","https://openalex.org/W2160608575","https://openalex.org/W2169194339","https://openalex.org/W6629862473","https://openalex.org/W6634010886","https://openalex.org/W6635412825","https://openalex.org/W6671828919"],"related_works":["https://openalex.org/W2184441312","https://openalex.org/W4388451300","https://openalex.org/W2060361571","https://openalex.org/W1975005191","https://openalex.org/W3176863924","https://openalex.org/W4361984403","https://openalex.org/W1485268022","https://openalex.org/W2382615100","https://openalex.org/W2331106272","https://openalex.org/W2182392910"],"abstract_inverted_index":{"Sahai":[0,52],"and":[1,44,53,66,73,95,125,138],"Waters":[2],"first":[3,83],"introduced":[4,32],"the":[5,33,64,99,121,143,148],"notion":[6,65],"of":[7,35,69,78,103],"fuzzy":[8,36],"identity":[9,37,140],"based":[10,38,50,91],"encryption":[11,22],"(Fuzzy":[12,40],"IBE)":[13],"in":[14,42,120,142],"2005,":[15],"which":[16],"can":[17],"be":[18,130],"applied":[19],"to":[20,129],"enable":[21],"using":[23],"biometric":[24],"inputs":[25],"as":[26,101],"identities.":[27],"Later,":[28],"Yang":[29],"et":[30],"al.":[31],"concept":[34],"signature":[39,106],"IBS)":[41],"2008,":[43],"constructed":[45],"a":[46,88,114,134],"Fuzzy":[47,55,70,79,84,110,139],"IBS":[48,71,80,85,111],"scheme":[49,72,86,112],"on":[51,92],"Waters's":[54],"IBE":[56],"scheme.":[57,81,107],"In":[58],"this":[59],"paper,":[60],"we":[61],"further":[62],"formalize":[63],"security":[67,97],"model":[68,124,146],"present":[74],"two":[75],"new":[76],"constructions":[77],"The":[82,108],"follows":[87],"certification":[89],"approach":[90],"standard":[93,105],"signatures":[94],"its":[96],"is":[98,113,127,152],"same":[100],"that":[102],"underlying":[104],"second":[109],"transformation":[115],"from":[116],"convertible":[117],"identification":[118],"schemes":[119],"random":[122,144],"oracle":[123,145],"it":[126],"proved":[128],"existentially":[131],"unforgeable":[132],"under":[133],"chosen":[135],"message":[136],"attack":[137,141],"assuming":[147],"Discrete":[149],"Logarithm":[150],"problem":[151],"computationally":[153],"hard.":[154]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
