{"id":"https://openalex.org/W2157794627","doi":"https://doi.org/10.1109/snpd.2007.471","title":"A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem","display_name":"A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem","publication_year":2007,"publication_date":"2007-07-01","ids":{"openalex":"https://openalex.org/W2157794627","doi":"https://doi.org/10.1109/snpd.2007.471","mag":"2157794627"},"language":"en","primary_location":{"id":"doi:10.1109/snpd.2007.471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd.2007.471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018981098","display_name":"Fengyin Li","orcid":"https://orcid.org/0000-0002-5730-3315"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengyin Li","raw_affiliation_strings":["College of Computer Science, Qufu Normal University, Rizhao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Qufu Normal University, Rizhao, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100624236","display_name":"Jiguo Yu","orcid":"https://orcid.org/0000-0001-6451-1158"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguo Yu","raw_affiliation_strings":["College of Computer Science, Qufu Normal University, Rizhao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Qufu Normal University, Rizhao, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073575838","display_name":"Hongwei Ju","orcid":null},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Ju","raw_affiliation_strings":["Department of Assets Management, Qufu Normal University, Rizhao, China"],"affiliations":[{"raw_affiliation_string":"Department of Assets Management, Qufu Normal University, Rizhao, China","institution_ids":["https://openalex.org/I202126657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018981098"],"corresponding_institution_ids":["https://openalex.org/I202126657"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.12460384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"27","issue":null,"first_page":"1176","last_page":"1182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10304","display_name":"Geometric and Algebraic Topology","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.8552109003067017},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.8185480833053589},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.7989928722381592},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7684195041656494},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.7372438907623291},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.6659676432609558},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.6519298553466797},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5721805691719055},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.5576263070106506},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4701438248157501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46823209524154663},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4621278941631317},{"id":"https://openalex.org/keywords/detection-threshold","display_name":"Detection threshold","score":0.4582253694534302},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44215258955955505},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4191851317882538},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.387190580368042},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.37782153487205505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.268446147441864},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26292240619659424},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.11382859945297241},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.05894210934638977},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.0585361123085022},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.057572901248931885}],"concepts":[{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.8552109003067017},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.8185480833053589},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.7989928722381592},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7684195041656494},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.7372438907623291},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.6659676432609558},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.6519298553466797},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5721805691719055},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.5576263070106506},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4701438248157501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46823209524154663},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4621278941631317},{"id":"https://openalex.org/C3019361169","wikidata":"https://www.wikidata.org/wiki/Q2609467","display_name":"Detection threshold","level":2,"score":0.4582253694534302},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44215258955955505},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4191851317882538},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.387190580368042},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.37782153487205505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.268446147441864},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26292240619659424},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.11382859945297241},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.05894210934638977},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.0585361123085022},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.057572901248931885},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd.2007.471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd.2007.471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316326","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1523991265","https://openalex.org/W1687797484","https://openalex.org/W1693345094","https://openalex.org/W2099040451","https://openalex.org/W2099695159","https://openalex.org/W2099950008","https://openalex.org/W2102625004","https://openalex.org/W2106599898","https://openalex.org/W2350368713","https://openalex.org/W3003662786"],"related_works":["https://openalex.org/W2151288616","https://openalex.org/W2348274958","https://openalex.org/W2134107133","https://openalex.org/W2372089223","https://openalex.org/W2407618154","https://openalex.org/W2356237935","https://openalex.org/W2375852898","https://openalex.org/W2119547174","https://openalex.org/W1974895476","https://openalex.org/W2371553948"],"abstract_inverted_index":{"The":[0,58],"threshold":[1,13,52,79],"group":[2,14,42,53,80],"signature":[3,15,43,54],"is":[4,56,60],"an":[5],"important":[6],"kind":[7],"of":[8,22,45,78],"signature.":[9],"So":[10],"far,":[11],"many":[12],"schemes":[16],"have":[17],"been":[18],"proposed,":[19],"but":[20,64,83],"most":[21],"them":[23],"suffer":[24],"from":[25],"conspiracy":[26,87],"attack":[27],"and":[28,40,47],"are":[29],"insecure.":[30],"In":[31],"this":[32],"paper,":[33],"based":[34],"on":[35],"the":[36,41,76,86],"discrete":[37],"logarithm":[38],"problem":[39],"model":[44],"Camenisch":[46],"Groth":[48],"[6],":[49],"a":[50],"secure":[51],"scheme":[55,59],"proposed.":[57],"not":[61,73],"only":[62,74],"threshold-signing,":[63],"also":[65,84],"threshold-verifying.":[66],"Performances":[67],"analysis":[68],"shows":[69],"that":[70],"it":[71],"can":[72],"satisfy":[75],"properties":[77],"signatures":[81],",":[82],"withstand":[85],"attack.":[88]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
