{"id":"https://openalex.org/W2068511074","doi":"https://doi.org/10.1145/1509315.1509415","title":"A secure identity-based threshold signature scheme from Tate pairings","display_name":"A secure identity-based threshold signature scheme from Tate pairings","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2068511074","doi":"https://doi.org/10.1145/1509315.1509415","mag":"2068511074"},"language":"en","primary_location":{"id":"doi:10.1145/1509315.1509415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1509315.1509415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 International Conference on Advanced Infocomm Technology - ICAIT '08","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113940198","display_name":"Zhou Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hong Zhou","raw_affiliation_strings":["Huazhong University of Sci. and Tech., China","Huazhong University of Science & Technol, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Sci. and Tech., China","institution_ids":[]},{"raw_affiliation_string":"Huazhong University of Science & Technol, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100607344","display_name":"Li Xi","orcid":"https://orcid.org/0000-0003-1898-6552"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xi Li","raw_affiliation_strings":["Huazhong University Sci. and Tech., China"],"affiliations":[{"raw_affiliation_string":"Huazhong University Sci. and Tech., China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100404947","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0003-4801-7162"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Huazhong University of Sci. and Tech., China","Huazhong University of Science & Technol, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Sci. and Tech., China","institution_ids":[]},{"raw_affiliation_string":"Huazhong University of Science & Technol, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113940198"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":1.1441,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.83937684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6263226270675659},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6156119704246521},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5392822623252869},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5195106267929077},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.514022707939148},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5075618028640747},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4933396875858307},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4762333035469055},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.46877163648605347},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2647649049758911},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19639071822166443}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6263226270675659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6156119704246521},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5392822623252869},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5195106267929077},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.514022707939148},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5075618028640747},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4933396875858307},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4762333035469055},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.46877163648605347},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2647649049758911},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19639071822166443},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1509315.1509415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1509315.1509415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 International Conference on Advanced Infocomm Technology - ICAIT '08","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W40231453","https://openalex.org/W128028275","https://openalex.org/W1518871948","https://openalex.org/W1521274767","https://openalex.org/W1569083856","https://openalex.org/W1607430658","https://openalex.org/W1883290937","https://openalex.org/W2142338469","https://openalex.org/W2151888728","https://openalex.org/W2152924492","https://openalex.org/W2160972660","https://openalex.org/W2167882086","https://openalex.org/W2286477783"],"related_works":["https://openalex.org/W2165589608","https://openalex.org/W3093557575","https://openalex.org/W2354231916","https://openalex.org/W3182767856","https://openalex.org/W2162140574","https://openalex.org/W1974314423","https://openalex.org/W2281112860","https://openalex.org/W2048539412","https://openalex.org/W3092327956","https://openalex.org/W767161385"],"abstract_inverted_index":{"Identity-based":[0],"systems":[1],"have":[2,28,41],"the":[3,34,79],"property":[4],"that":[5,58,78,86],"a":[6,18,43],"user's":[7],"public":[8],"key":[9],"can":[10,60],"be":[11,89],"easily":[12],"calculated":[13],"from":[14,50],"his":[15],"identity":[16],"by":[17],"publicly":[19],"available":[20],"function.":[21],"The":[22,53],"bilinear":[23],"pairings,":[24,27],"especially":[25],"Tate":[26,51],"high":[29],"performance":[30,75],"in":[31],"cryptography.":[32],"With":[33],"foundation":[35],"of":[36,94],"above":[37],"two":[38],"properties,":[39],"we":[40],"proposed":[42,80],"new":[44],"ID-Based":[45],"(t,n)":[46],"threshold":[47],"signature":[48],"scheme":[49,54,81],"pairings.":[52],"is":[55,82],"proved":[56],"secure":[57],"it":[59,87],"resist":[61],"attacks":[62],"including":[63],"plaintext":[64],"attack,":[65,68],"recovery":[66],"equation":[67],"conspiracy":[69],"attack":[70],"and":[71,97],"impersonation":[72],"attack.":[73],"Furthermore,":[74],"analysis":[76],"shows":[77],"simple,":[83],"efficient":[84],"so":[85],"will":[88],"suitable":[90],"for":[91],"an":[92],"environment":[93],"finite":[95],"bandwidth":[96],"low":[98],"capability":[99],"equipment.":[100]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
