{"id":"https://openalex.org/W2000609055","doi":"https://doi.org/10.1145/2600694.2600696","title":"Attribute-based signatures without pairings via the fiat-shamir paradigm","display_name":"Attribute-based signatures without pairings via the fiat-shamir paradigm","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2000609055","doi":"https://doi.org/10.1145/2600694.2600696","mag":"2000609055"},"language":"en","primary_location":{"id":"doi:10.1145/2600694.2600696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600694.2600696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on ASIA public-key cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035258118","display_name":"Hiroaki Anada","orcid":"https://orcid.org/0000-0002-4472-0662"},"institutions":[{"id":"https://openalex.org/I4210148705","display_name":"Institute of Systems, Information Technologies and Nanotechnologies","ror":"https://ror.org/04j4pme17","country_code":"JP","type":"facility","lineage":["https://openalex.org/I4210148705"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hiroaki Anada","raw_affiliation_strings":["Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Fukuoka, Japan","institution_ids":["https://openalex.org/I4210148705"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113873046","display_name":"Seiko Arita","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Seiko Arita","raw_affiliation_strings":["Institute of Information Security (IISEC), Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security (IISEC), Yokohama, Japan","institution_ids":["https://openalex.org/I4210138172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001126368","display_name":"Kouichi Sakurai","orcid":"https://orcid.org/0000-0003-4621-1674"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouichi Sakurai","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035258118"],"corresponding_institution_ids":["https://openalex.org/I4210148705"],"apc_list":null,"apc_paid":null,"fwci":2.8631,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.91731347,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.780539333820343},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6273561120033264},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6192363500595093},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6059511303901672},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5640360713005066},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.48174548149108887},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4470922648906708},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.44354912638664246},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.41172701120376587},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3582921028137207},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3396648168563843},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.21957501769065857},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20969781279563904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17328110337257385}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.780539333820343},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6273561120033264},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6192363500595093},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6059511303901672},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5640360713005066},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.48174548149108887},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4470922648906708},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.44354912638664246},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.41172701120376587},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3582921028137207},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3396648168563843},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.21957501769065857},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20969781279563904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17328110337257385},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600694.2600696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600694.2600696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on ASIA public-key cryptography","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7694911007","display_name":null,"funder_award_id":"25540004","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W14130453","https://openalex.org/W119362848","https://openalex.org/W1484557542","https://openalex.org/W1517505812","https://openalex.org/W1526993157","https://openalex.org/W1589034595","https://openalex.org/W1600010237","https://openalex.org/W1646354800","https://openalex.org/W1892798954","https://openalex.org/W2089134683","https://openalex.org/W2117685508","https://openalex.org/W2129596906","https://openalex.org/W2138001464","https://openalex.org/W2152587883","https://openalex.org/W2167496998","https://openalex.org/W3128663643","https://openalex.org/W4300349690","https://openalex.org/W6631052716","https://openalex.org/W6639476995"],"related_works":["https://openalex.org/W2396944024","https://openalex.org/W2971398334","https://openalex.org/W2048194152","https://openalex.org/W2970807517","https://openalex.org/W2131561978","https://openalex.org/W2949682506","https://openalex.org/W2016471739","https://openalex.org/W16894843","https://openalex.org/W2999264970","https://openalex.org/W140041957"],"abstract_inverted_index":{"We":[0],"propose":[1],"the":[2,15,23,48,78,96,121],"first":[3,27],"practical":[4],"attribute-based":[5,85],"signature":[6],"(ABS)":[7],"scheme":[8,76,88,102,108,127],"with":[9,72],"attribute":[10,111],"privacy":[11,112],"without":[12,131],"pairings":[13],"in":[14,22,120],"random":[16,122],"oracle":[17,123],"model.":[18,124],"Our":[19,40,125],"strategy":[20],"is":[21,44],"Fiat-Shamir":[24,79,97],"paradigm;":[25],"we":[26,81,94],"provide":[28],"a":[29,33,45,62,73,83,105],"generic":[30,84,106],"construction":[31],"of":[32,37,47,61,77,89,91],"boolean":[34,41,58,69],"proof":[35,42,70,90],"system":[36,43,71],"Sgm-protocol":[38],"type.":[39],"generalization":[46],"well-known":[49],"OR-proof":[50],"system;":[51],"that":[52],"is,":[53],"it":[54],"can":[55,114,128],"treat":[56],"any":[57],"formula":[59],"instead":[60],"single":[63],"OR-gate.":[64],"Then,":[65],"by":[66],"combining":[67],"our":[68,100],"credential":[74],"bundle":[75],"signature,":[80],"obtain":[82,104],"identification":[86],"(ABID)":[87],"knowledge.":[92],"Finally,":[93],"apply":[95],"transform":[98],"to":[99,103,117],"ABID":[101],"ABS":[107,126],"which":[109],"possesses":[110],"and":[113],"be":[115,118,129],"proved":[116],"secure":[119],"constructed":[130],"pairings.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
