{"id":"https://openalex.org/W1996162421","doi":"https://doi.org/10.1145/1968613.1968652","title":"A pairing based cryptographic anonymous authentication scheme","display_name":"A pairing based cryptographic anonymous authentication scheme","publication_year":2011,"publication_date":"2011-02-21","ids":{"openalex":"https://openalex.org/W1996162421","doi":"https://doi.org/10.1145/1968613.1968652","mag":"1996162421"},"language":"en","primary_location":{"id":"doi:10.1145/1968613.1968652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1968613.1968652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038301082","display_name":"Saba Jalal","orcid":null},"institutions":[{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saba Jalal","raw_affiliation_strings":["Indiana Univ. Purdue Univ. Indianapolis","Indiana Univ.-Purdue Univ. Indianapolis"],"affiliations":[{"raw_affiliation_string":"Indiana Univ. Purdue Univ. Indianapolis","institution_ids":["https://openalex.org/I55769427"]},{"raw_affiliation_string":"Indiana Univ.-Purdue Univ. Indianapolis","institution_ids":["https://openalex.org/I55769427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061007599","display_name":"Brian King","orcid":"https://orcid.org/0000-0001-7732-0860"},"institutions":[{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian King","raw_affiliation_strings":["Indiana Univ. Purdue Univ. Indianapolis","Indiana Univ.-Purdue Univ. Indianapolis"],"affiliations":[{"raw_affiliation_string":"Indiana Univ. Purdue Univ. Indianapolis","institution_ids":["https://openalex.org/I55769427"]},{"raw_affiliation_string":"Indiana Univ.-Purdue Univ. Indianapolis","institution_ids":["https://openalex.org/I55769427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038301082"],"corresponding_institution_ids":["https://openalex.org/I55769427"],"apc_list":null,"apc_paid":null,"fwci":0.4276,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71000817,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7916109561920166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6472277045249939},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6175193786621094},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6014577746391296},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5669974684715271},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5539822578430176},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5394540429115295},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.5187970995903015},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.4927680790424347},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45008817315101624},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4277097284793854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38027292490005493},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.29433202743530273}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7916109561920166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6472277045249939},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6175193786621094},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6014577746391296},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5669974684715271},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5539822578430176},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5394540429115295},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.5187970995903015},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.4927680790424347},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45008817315101624},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4277097284793854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38027292490005493},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.29433202743530273},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1968613.1968652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1968613.1968652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1519525564","https://openalex.org/W1601001795","https://openalex.org/W1655958391","https://openalex.org/W1913505164","https://openalex.org/W1978884755","https://openalex.org/W1989824086","https://openalex.org/W2014239329","https://openalex.org/W2036534296","https://openalex.org/W2039875296","https://openalex.org/W2065554061","https://openalex.org/W2075215400","https://openalex.org/W2099390798","https://openalex.org/W2103647628","https://openalex.org/W2107401406","https://openalex.org/W2120763591","https://openalex.org/W2138719936","https://openalex.org/W2158022141","https://openalex.org/W2165210192","https://openalex.org/W2911424200","https://openalex.org/W6635924301","https://openalex.org/W6675998035"],"related_works":["https://openalex.org/W1489203378","https://openalex.org/W2373013104","https://openalex.org/W2049353548","https://openalex.org/W1513753724","https://openalex.org/W2376025599","https://openalex.org/W2009991313","https://openalex.org/W1687167769","https://openalex.org/W2398162964","https://openalex.org/W1745716700","https://openalex.org/W2043622642"],"abstract_inverted_index":{"Privacy":[0],"and":[1,61,74],"authenticity":[2],"are":[3,50,67],"two":[4],"critical":[5],"aspects":[6],"of":[7,23,117],"security.":[8],"Our":[9],"goal":[10],"is":[11],"to":[12,35,107,110,120,126,127,138],"construct":[13,95],"a":[14,96,111],"protocol":[15,33,49],"using":[16],"pairing":[17,99],"based":[18,100],"cryptography":[19],"that":[20],"provides":[21],"all":[22],"the":[24,32,71,75,83,87,115,118,134,136],"necessary":[25],"security":[26],"properties,":[27],"as":[28,30,36,40,55,57],"well":[29,56],"make":[31],"compliant":[34],"many":[37],"applications/problem":[38],"domains":[39],"possible.":[41],"Some":[42],"motivating":[43],"applications":[44],"for":[45],"an":[46],"anonymous":[47,98],"authentication":[48,101],"E-commerce,":[51],"E-voting,":[52],"E-library,":[53],"E-cash,":[54],"some":[58],"medical":[59],"applications,":[60],"mobile":[62],"agent":[63],"applications.":[64],"Typically":[65],"there":[66],"three":[68],"parties":[69],"involved,":[70],"user,":[72],"servers,":[73],"trusted":[76],"third":[77],"party":[78],"TTP.":[79],"Each":[80],"entity":[81],"in":[82,124],"system":[84],"registers":[85],"with":[86,129],"TTP":[88,135],"only":[89],"once.":[90],"In":[91],"our":[92],"design":[93],"we":[94,132],"fully":[97],"scheme,":[102],"which":[103],"allows":[104],"each":[105],"user":[106,119],"authenticates":[108],"themselves":[109],"server":[112],"without":[113],"requiring":[114],"identity":[116],"be":[121],"revealed.":[122],"Further,":[123],"order":[125],"deal":[128],"malicious":[130,140],"users,":[131],"provide":[133],"capability":[137],"track":[139],"users.":[141]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
