{"id":"https://openalex.org/W2786309650","doi":"https://doi.org/10.1142/s0129054117400172","title":"A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting","display_name":"A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2786309650","doi":"https://doi.org/10.1142/s0129054117400172","mag":"2786309650"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054117400172","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117400172","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002187786","display_name":"Jianye Huang","orcid":"https://orcid.org/0000-0001-5212-7562"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianye Huang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011282586","display_name":"Qiong Huang","orcid":"https://orcid.org/0000-0002-7666-8985"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055868236","display_name":"Chunhua Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhua Pan","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, P. R. China","institution_ids":["https://openalex.org/I101479585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002187786"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65058447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"28","issue":"06","first_page":"761","last_page":"780"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6221356391906738},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.5407446026802063},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4781566560268402},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.46253398060798645},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4582814574241638},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.45200225710868835},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4257640242576599},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42477312684059143},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40163350105285645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21126121282577515},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.14972272515296936},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.1475730538368225},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1160113513469696}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6221356391906738},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.5407446026802063},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4781566560268402},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.46253398060798645},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4582814574241638},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.45200225710868835},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4257640242576599},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42477312684059143},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40163350105285645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21126121282577515},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.14972272515296936},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.1475730538368225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1160113513469696},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054117400172","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117400172","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W236432643","https://openalex.org/W1559343931","https://openalex.org/W1724890242","https://openalex.org/W1998630298","https://openalex.org/W2053318192","https://openalex.org/W2062839811","https://openalex.org/W2175377689","https://openalex.org/W2290462966","https://openalex.org/W2531648609"],"related_works":["https://openalex.org/W2810692302","https://openalex.org/W2769321838","https://openalex.org/W2736665439","https://openalex.org/W2733169120","https://openalex.org/W2395853207","https://openalex.org/W1984252011","https://openalex.org/W2365297471","https://openalex.org/W2065153280","https://openalex.org/W2013333532","https://openalex.org/W3011679449","https://openalex.org/W1996912717","https://openalex.org/W3116055699","https://openalex.org/W2794971392","https://openalex.org/W2692208727","https://openalex.org/W2377875838","https://openalex.org/W2759215600","https://openalex.org/W2049570869","https://openalex.org/W1967933658","https://openalex.org/W2023717768","https://openalex.org/W1989959695"],"abstract_inverted_index":{"Traditional":[0],"cryptography":[1,61],"considers":[2],"the":[3,8,14,20,25,35,45,67,87,96,100,112,117,133,140,148],"security":[4,47],"of":[5,23,34,49,99,127],"cryptosystems":[6],"when":[7],"attackers":[9,26],"have":[10],"no":[11],"access":[12],"to":[13,19,29,65,81,94],"secret":[15,32],"key.":[16],"However,":[17,90],"due":[18],"imperfect":[21],"implementation":[22],"cryptosystems,":[24],"are":[27,41,144],"able":[28],"obtain":[30],"partial":[31],"state":[33],"systems":[36],"via":[37],"side-channel":[38],"attacks,":[39],"which":[40],"not":[42],"considered":[43],"in":[44,86,110,132],"traditional":[46],"notions":[48],"cryptographic":[50],"primitives,":[51],"including":[52],"digital":[53],"signature,":[54],"and":[55,116,136],"thus":[56],"break":[57],"their":[58,91],"security.":[59],"Leakage-resilient":[60],"was":[62],"then":[63],"proposed":[64],"solve":[66],"problem.":[68],"Recently,":[69],"Wang":[70],"et":[71],"al.":[72],"showed":[73],"that":[74,138],"any":[75],"signature":[76,130],"scheme":[77,131],"can":[78],"be":[79],"transformed":[80],"a":[82,107,124],"strongly":[83,128],"unforgeable":[84,129],"one":[85],"leakage":[88,114,134],"setting.":[89],"transformation":[92],"requires":[93],"change":[95],"key":[97],"pair":[98],"scheme.":[101,150],"In":[102],"this":[103],"paper,":[104],"we":[105,122],"present":[106],"key-modification-free":[108],"solution":[109],"both":[111],"bounded":[113],"model":[115],"auxiliary":[118],"input":[119],"model.":[120],"Specifically,":[121],"propose":[123],"black-box":[125],"construction":[126],"setting,":[135],"show":[137],"if":[139],"underlying":[141],"building":[142],"blocks":[143],"leakage-resilient,":[145],"so":[146],"is":[147],"resulting":[149]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
