{"id":"https://openalex.org/W2030046482","doi":"https://doi.org/10.1142/s0219622004001318","title":"UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY","display_name":"UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY","publication_year":2004,"publication_date":"2004-12-01","ids":{"openalex":"https://openalex.org/W2030046482","doi":"https://doi.org/10.1142/s0219622004001318","mag":"2030046482"},"language":"en","primary_location":{"id":"doi:10.1142/s0219622004001318","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219622004001318","pdf_url":null,"source":{"id":"https://openalex.org/S207089700","display_name":"International Journal of Information Technology & Decision Making","issn_l":"0219-6220","issn":["0219-6220","1793-6845"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology &amp; Decision Making","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055309267","display_name":"Shirley Cheung","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"SHIRLEY H. C. CHEUNG","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China","Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406176","display_name":"Chang\u2010Hee Lee","orcid":"https://orcid.org/0000-0001-8066-6838"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"C. H. LEE","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China","Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101712881","display_name":"Yunlei Zhao","orcid":"https://orcid.org/0000-0002-2623-9170"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"YUNLEI ZHAO","raw_affiliation_strings":["Department of Computer Science, Fudan University, Shanghai 200433, P. R. China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Fudan University, Shanghai 200433, P. R. China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055309267"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11218359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"03","issue":"04","first_page":"673","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.7822353839874268},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7604189515113831},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7007144093513489},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6696072816848755},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5399423241615295},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5175901651382446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46176260709762573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4511911869049072},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.41882622241973877},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4133973717689514},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1992340385913849},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13831225037574768}],"concepts":[{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.7822353839874268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7604189515113831},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7007144093513489},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6696072816848755},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5399423241615295},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5175901651382446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46176260709762573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4511911869049072},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.41882622241973877},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4133973717689514},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1992340385913849},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13831225037574768},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0219622004001318","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219622004001318","pdf_url":null,"source":{"id":"https://openalex.org/S207089700","display_name":"International Journal of Information Technology & Decision Making","issn_l":"0219-6220","issn":["0219-6220","1793-6845"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology &amp; Decision Making","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:wsi:ijitdm:v:03:y:2004:i:04:n:s0219622004001318","is_oa":false,"landing_page_url":"http://www.worldscientific.com/doi/abs/10.1142/S0219622004001318","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2010553858","https://openalex.org/W2065722310","https://openalex.org/W2090903439","https://openalex.org/W2103647628","https://openalex.org/W2113085788","https://openalex.org/W2151413173","https://openalex.org/W2156186849","https://openalex.org/W3142333173"],"related_works":["https://openalex.org/W2124763975","https://openalex.org/W2390023760","https://openalex.org/W2904818008","https://openalex.org/W2290466083","https://openalex.org/W2390942931","https://openalex.org/W2362904663","https://openalex.org/W2149234266","https://openalex.org/W2125461068","https://openalex.org/W1981680180","https://openalex.org/W2342603380"],"abstract_inverted_index":{"Blind":[0],"signatures":[1],"play":[2],"a":[3,57,67],"critical":[4],"role":[5],"in":[6,19],"digital":[7,117],"cash":[8,118],"systems.":[9],"In":[10],"this":[11],"paper,":[12],"we":[13],"investigate":[14],"the":[15,20,28,39,43,71],"blind":[16,46],"signature":[17,47,60,73],"functionality":[18,61,74],"framework":[21],"of":[22,70,103,116],"universally":[23,44,121],"composable":[24,45,122],"(UC)":[25],"security":[26,30],"\u2014":[27],"strongest":[29],"guarantees":[31],"up":[32],"to":[33,97,109],"now":[34],"for":[35],"cryptographic":[36],"protocols":[37],"over":[38],"Internet.":[40],"We":[41,81],"present":[42],"functionality,":[48],"[Formula:":[49,62,75,85,89],"see":[50,63,76,86,90],"text].":[51],"Our":[52,100],"approach":[53],"is":[54,66,102],"based":[55],"on":[56],"new":[58],"UC":[59],"text],":[64],"which":[65],"modified":[68],"version":[69],"original":[72],"text]":[77,87,91],"presented":[78],"by":[79],"Canetti.":[80],"also":[82],"prove":[83],"that":[84],"and":[88,106,113],"are":[92],"actually":[93],"equivalent":[94],"with":[95,120],"respect":[96],"non-adaptive":[98],"adversaries.":[99],"result":[101],"both":[104],"theoretical":[105],"practical":[107,114],"consequence":[108],"future":[110],"research":[111],"studies":[112],"implementations":[115],"systems":[119],"security.":[123]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
