{"id":"https://openalex.org/W1966051776","doi":"https://doi.org/10.1145/1229285.1229310","title":"Unconditionally secure ring authentication","display_name":"Unconditionally secure ring authentication","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W1966051776","doi":"https://doi.org/10.1145/1229285.1229310","mag":"1966051776"},"language":"en","primary_location":{"id":"doi:10.1145/1229285.1229310","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["University of Wollongong, Australia","Univ. of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Univ. of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100599251","display_name":"Shuhong Wang","orcid":"https://orcid.org/0000-0002-5251-8704"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shuhong Wang","raw_affiliation_strings":["University of Wollongong, Australia","Univ. of Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Univ. of Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008979622","display_name":"Yvo Desmedt","orcid":"https://orcid.org/0000-0002-6679-7484"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yvo Desmedt","raw_affiliation_strings":["University College London, London, UK"],"affiliations":[{"raw_affiliation_string":"University College London, London, UK","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010447902"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":0.483,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.74387537,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"173","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.845058798789978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7710540294647217},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6967393159866333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6387320756912231},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6336438655853271},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5392509698867798},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.5167214274406433},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5105146169662476},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4685441255569458},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46762165427207947},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45093026757240295},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.428413450717926},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.41387224197387695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3698785901069641},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13413143157958984}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.845058798789978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7710540294647217},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6967393159866333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6387320756912231},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6336438655853271},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5392509698867798},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.5167214274406433},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5105146169662476},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4685441255569458},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46762165427207947},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45093026757240295},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.428413450717926},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.41387224197387695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3698785901069641},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13413143157958984},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1229285.1229310","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:139070","is_oa":false,"landing_page_url":"http://discovery.ucl.ac.uk/139070/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In: Bao, F and Miller, S, (eds.)   (pp. pp. 173-181).  ACM (2007)     ","raw_type":"Proceedings paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1484798037","https://openalex.org/W1493284097","https://openalex.org/W1516444320","https://openalex.org/W1519583411","https://openalex.org/W1579132848","https://openalex.org/W1589034595","https://openalex.org/W1590263452","https://openalex.org/W1593401740","https://openalex.org/W1595974665","https://openalex.org/W1656678770","https://openalex.org/W1741292496","https://openalex.org/W1743965195","https://openalex.org/W1968160142","https://openalex.org/W1969945141","https://openalex.org/W1978183200","https://openalex.org/W1985623009","https://openalex.org/W2030083434","https://openalex.org/W2074594718","https://openalex.org/W2087811006","https://openalex.org/W2088379485","https://openalex.org/W2090388266","https://openalex.org/W2091887150","https://openalex.org/W2103687166","https://openalex.org/W2105514582","https://openalex.org/W2105834166","https://openalex.org/W2129483619","https://openalex.org/W2146749719","https://openalex.org/W2148516995","https://openalex.org/W2161784294","https://openalex.org/W2163614799","https://openalex.org/W2164728083","https://openalex.org/W2570008916","https://openalex.org/W2612247901","https://openalex.org/W2911424200","https://openalex.org/W3023478445","https://openalex.org/W3111297213","https://openalex.org/W4205092462","https://openalex.org/W4205241946"],"related_works":["https://openalex.org/W2166253510","https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W283281285","https://openalex.org/W4380928496","https://openalex.org/W2712809602","https://openalex.org/W2114021805","https://openalex.org/W2011423695","https://openalex.org/W2118200228","https://openalex.org/W2185872751"],"abstract_inverted_index":{"We":[0,157],"propose":[1,160],"ring":[2,10,87,117,193],"authentication":[3,11,194],"in":[4,75,188,192],"unconditionally":[5,54],"secure":[6,55],"setting.":[7],"In":[8,116,137],"a":[9,13,17,27,161],"system":[12],"sender":[14,51],"can":[15,33,125,147,184],"choose":[16],"set":[18],"of":[19,36,134,144,154,171,179],"users":[20,65],"and":[21,66,111,175],"construct":[22],"an":[23,97,119],"authenticated":[24],"message":[25,38],"for":[26],"receiver":[28,32,59],"such":[29],"that":[30,93,105],"the":[31,37,42,47,58,76,83,91,106,141,145,151,155,169],"verify":[34],"authenticity":[35],"with":[39,90,99,121],"respect":[40],"to":[41,63,69,71,82,132,150,168],"user":[43],"group":[44,114],"chosen":[45],"by":[46,86,113],"real":[48],"sender.":[49],"The":[50,182],"will":[52],"be":[53,148,186],"even":[56],"if":[57],"has":[60,67],"corrupted":[61],"up":[62,70],"c":[64],"access":[68],"\u2113":[72],"past":[73],"messages":[74,129],"system.":[77,156],"This":[78],"functionality":[79],"is":[80,95,108,112,166],"similar":[81],"one":[84],"provided":[85],"signature":[88],"systems":[89,140,195],"difference":[92],"protection":[94],"against":[96],"adversary":[98,120,146],"unlimited":[100,122],"power.":[101],"(This":[102],"also":[103,185],"implies":[104],"verification":[107],"not":[109],"public":[110,197],"members.)":[115],"signatures":[118],"computational":[123,189],"power":[124],"always":[126],"forge":[127],"signed":[128],"attributing":[130],"them":[131],"groups":[133],"his":[135],"choice.":[136],"our":[138],"proposed":[139],"success":[142],"chance":[143],"reduced":[149,167],"required":[152],"security":[153,165,170],"define":[158],"model,":[159],"generic":[162],"construction":[163,183],"whose":[164],"its":[172],"building":[173],"blocks,":[174],"give":[176],"concrete":[177],"examples":[178],"this":[180],"construction.":[181],"used":[187],"setting":[190],"resulting":[191],"without":[196],"key":[198],"cryptography.":[199]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
