{"id":"https://openalex.org/W2955071147","doi":"https://doi.org/10.1142/s0129054119400148","title":"Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model","display_name":"Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2955071147","doi":"https://doi.org/10.1142/s0129054119400148","mag":"2955071147"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054119400148","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054119400148","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qiqi Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Lai","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, Shannxi 710119, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, Shannxi 710119, P. R. China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000988425","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0002-0419-1209"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Yang","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, Shannxi 710119, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, Shannxi 710119, P. R. China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083800827","display_name":"Zhe Xia","orcid":"https://orcid.org/0000-0003-4397-1248"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Xia","raw_affiliation_strings":["School of Computer Science and Technology, Wuhan University of Technology, Wuhan 430070, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Wuhan University of Technology, Wuhan 430070, P. R. China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038699052","display_name":"Yannan Li","orcid":"https://orcid.org/0000-0002-4407-9027"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yannan Li","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101910792","display_name":"Yuan Chen","orcid":"https://orcid.org/0000-0003-3004-1455"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, P. R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073915674","display_name":"Zhenlong Li","orcid":"https://orcid.org/0000-0002-8938-5466"},"institutions":[{"id":"https://openalex.org/I4210132539","display_name":"Northwest Institute of Mechanical and Electrical Engineering","ror":"https://ror.org/03pz37k82","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210132539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenlong Li","raw_affiliation_strings":["Northwest Institute of Mechanical and Electrical Engineering, Xianyang 712099, P. R. China"],"affiliations":[{"raw_affiliation_string":"Northwest Institute of Mechanical and Electrical Engineering, Xianyang 712099, P. R. China","institution_ids":["https://openalex.org/I4210132539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000988425"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I88830068"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06641688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"30","issue":"04","first_page":"589","last_page":"606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6962310671806335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6389914751052856},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.617929220199585},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.576939582824707},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.5566415190696716},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5225479006767273},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4880172312259674},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.47817927598953247},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46090731024742126},{"id":"https://openalex.org/keywords/standard-model","display_name":"Standard Model (mathematical formulation)","score":0.42564043402671814},{"id":"https://openalex.org/keywords/lattice-problem","display_name":"Lattice problem","score":0.41169029474258423},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.31775760650634766},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2468993365764618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21325042843818665}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6962310671806335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6389914751052856},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.617929220199585},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.576939582824707},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.5566415190696716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5225479006767273},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4880172312259674},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.47817927598953247},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46090731024742126},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.42564043402671814},{"id":"https://openalex.org/C168482242","wikidata":"https://www.wikidata.org/wiki/Q6497128","display_name":"Lattice problem","level":3,"score":0.41169029474258423},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.31775760650634766},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2468993365764618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21325042843818665},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C40976572","wikidata":"https://www.wikidata.org/wiki/Q2330873","display_name":"Gauge (firearms)","level":2,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0129054119400148","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054119400148","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-4004","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/2986","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1518187966","https://openalex.org/W1547517307","https://openalex.org/W1573743738","https://openalex.org/W1588518948","https://openalex.org/W1943021534","https://openalex.org/W2007466965","https://openalex.org/W2012454489","https://openalex.org/W2038761522","https://openalex.org/W2122973102","https://openalex.org/W2146907493","https://openalex.org/W2153971105","https://openalex.org/W2162561603","https://openalex.org/W2165111290","https://openalex.org/W2170299798","https://openalex.org/W2268989031","https://openalex.org/W2331051101","https://openalex.org/W2397309740","https://openalex.org/W2506505058","https://openalex.org/W2547497046","https://openalex.org/W2550436106","https://openalex.org/W2585855180","https://openalex.org/W2737320005","https://openalex.org/W2774035703","https://openalex.org/W2963491455"],"related_works":["https://openalex.org/W3029306306","https://openalex.org/W3197081079","https://openalex.org/W2942635421","https://openalex.org/W2904818008","https://openalex.org/W3209433403","https://openalex.org/W4281964710","https://openalex.org/W2151237818","https://openalex.org/W1593915850","https://openalex.org/W3033575787","https://openalex.org/W2518735310"],"abstract_inverted_index":{"As":[0,220],"the":[1,20,49,96,105,123,139,146,178,187,194,201,210],"progress":[2],"of":[3,48,67,112,189],"quantum":[4],"computers,":[5],"it":[6,109],"is":[7,46,152,175,217],"desired":[8],"to":[9,63,115,165,176,192,200],"propose":[10,130],"many":[11],"more":[12,117],"efficient":[13,102,118],"cryptographic":[14,24,36],"constructions":[15],"with":[16,60,79,135,141,198,205],"post-quantum":[17,61,68,80],"security.":[18],"In":[19,126],"literatures,":[21],"almost":[22],"all":[23,76,89],"schemes":[25,70],"and":[26,31,52,71,186,231],"protocols":[27],"can":[28,57],"be":[29,111],"explained":[30],"constructed":[32],"modularly":[33],"from":[34,120],"certain":[35],"primitives,":[37],"among":[38],"which":[39],"an":[40],"Identity-Based":[41],"Hash":[42],"Proof":[43],"System":[44],"(IB-HPS)":[45],"one":[47],"most":[50],"basic":[51],"important":[53],"primitives.":[54],"Therefore,":[55],"we":[56,129],"utilize":[58],"IB-HPSs":[59,78,92,119,208],"security":[62,81],"present":[64],"several":[65],"types":[66],"secure":[69],"protocols.":[72],"Up":[73],"until":[74],"now,":[75],"known":[77],"are":[82,93],"instantiated":[83],"based":[84,137,161],"on":[85,138,162,229],"latticed-based":[86],"assumptions.":[87],"However,":[88],"these":[90],"lattice-based":[91],"either":[94],"in":[95,104,122,145,169,209],"random":[97,190],"oracle":[98],"model":[99],"or":[100],"not":[101],"enough":[103],"standard":[106,124,147,211],"model.":[107,125,148],"Hence,":[108],"should":[110],"great":[113],"significance":[114],"construct":[116],"lattices":[121],"this":[127],"paper,":[128],"a":[131,156,221],"new":[132,150],"smooth":[133],"IB-HPS":[134],"anonymity":[136],"Learning":[140],"Errors":[142],"(LWE)":[143],"assumption":[144],"This":[149],"construction":[151,224],"mainly":[153],"inspired":[154],"by":[155,182],"classical":[157],"identity-based":[158],"encryption":[159],"scheme":[160],"LWE":[163],"due":[164],"Agreawal":[166],"et":[167,184],"al.":[168,185],"Eurocrypt":[170],"2010.":[171],"And":[172],"our":[173,213,223],"innovation":[174],"employ":[177],"algorithm":[179],"SampleGaussian":[180],"introduced":[181],"Gentry":[183],"property":[188],"lattice":[191],"simulate":[193],"identity":[195],"secret":[196],"key":[197,216],"respect":[199],"challenge":[202],"identity.":[203],"Compared":[204],"other":[206],"existing":[207],"model,":[212],"master":[214],"public":[215],"quite":[218],"compact.":[219],"result,":[222],"has":[225],"much":[226],"lower":[227],"overheads":[228],"computation":[230],"storage.":[232]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
