{"id":"https://openalex.org/W4385255507","doi":"https://doi.org/10.1145/3586102.3586110","title":"Identity-based Linkable Blind Ring Signature Scheme on Lattice","display_name":"Identity-based Linkable Blind Ring Signature Scheme on Lattice","publication_year":2022,"publication_date":"2022-12-01","ids":{"openalex":"https://openalex.org/W4385255507","doi":"https://doi.org/10.1145/3586102.3586110"},"language":"en","primary_location":{"id":"doi:10.1145/3586102.3586110","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3586102.3586110","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 12th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051300777","display_name":"X. T. Liao","orcid":"https://orcid.org/0009-0004-9266-3940"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xue Liao","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101680080","display_name":"Yi\u2010Hua Zhou","orcid":"https://orcid.org/0000-0002-9191-964X"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihua Zhou","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102727343","display_name":"Jiawei Xu","orcid":"https://orcid.org/0009-0007-0388-4998"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawei Xu","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014655163","display_name":"Shuaikun Xing","orcid":"https://orcid.org/0009-0008-7240-1731"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuaikun Xing","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002101183","display_name":"W.Q. Zou","orcid":"https://orcid.org/0009-0005-2707-1989"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zou","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101912603","display_name":"Jin Zhou","orcid":"https://orcid.org/0009-0001-2986-0368"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Zhou","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100644738","display_name":"Qi Wang","orcid":"https://orcid.org/0009-0008-8516-6945"},"institutions":[{"id":"https://openalex.org/I4210144487","display_name":"Cloud Computing Center","ror":"https://ror.org/04aa0zm65","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210144487"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Wang","raw_affiliation_strings":["Trusted Computing Technology Co.LTD Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing Technology Co.LTD Shenzhen, China","institution_ids":["https://openalex.org/I4210144487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033013991","display_name":"Zhenhu Ning","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhu Ning","raw_affiliation_strings":["faculty of Information Technology, Beijing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"faculty of Information Technology, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5051300777"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19738316,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.840908944606781},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7848589420318604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7267425656318665},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6035110950469971},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.5818240642547607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5394696593284607},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5011651515960693},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47371309995651245},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4497721195220947},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4466109275817871},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.43480485677719116},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.42215585708618164},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4199271500110626},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.41843605041503906},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3408637046813965},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32982203364372253},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19640865921974182}],"concepts":[{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.840908944606781},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7848589420318604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7267425656318665},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6035110950469971},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.5818240642547607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5394696593284607},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5011651515960693},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47371309995651245},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4497721195220947},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4466109275817871},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.43480485677719116},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.42215585708618164},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4199271500110626},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.41843605041503906},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3408637046813965},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32982203364372253},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19640865921974182},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3586102.3586110","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3586102.3586110","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 12th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1994790157","https://openalex.org/W2106121141","https://openalex.org/W4206696315","https://openalex.org/W4361230065","https://openalex.org/W4404437288","https://openalex.org/W6635301273"],"related_works":["https://openalex.org/W140041957","https://openalex.org/W2385375699","https://openalex.org/W2606299826","https://openalex.org/W2584075666","https://openalex.org/W1562356451","https://openalex.org/W2166253510","https://openalex.org/W834668912","https://openalex.org/W2363288909","https://openalex.org/W1500902146","https://openalex.org/W2804832731"],"abstract_inverted_index":{"Identity-based":[0],"link-ring":[1],"signature":[2,17,43,48,66,92],"schemes":[3],"are":[4],"widely":[5],"used":[6,76],"in":[7,49,55],"e-commerce,":[8],"e-voting,":[9],"blockchain":[10],"security":[11],"and":[12,46,89,118],"other":[13],"fields.The":[14],"link-ability":[15,119],"of":[16,37,41,52,120],"scheme":[18,122],"ensures":[19],"that":[20],"the":[21,29,35,42,50,71,79,90,98,105,114,121,124,130],"same":[22,30],"user":[23,44],"can":[24],"only":[25],"sign":[26],"once":[27],"with":[28],"private":[31,81,108],"key.":[32,109],"Aiming":[33],"at":[34],"requirements":[36],"question":[38,53],"confidentiality,":[39],"anonymity":[40],"identity,":[45],"one-time":[47,84,91],"process":[51],"signing":[54],"online":[56],"exams,":[57],"this":[58,69,111],"paper":[59,112],"proposes":[60],"an":[61],"identity-based":[62],"linkable":[63],"blind":[64],"ring":[65],"scheme.":[67],"In":[68],"paper,":[70],"lattice":[72],"delegation":[73],"algorithm":[74,101],"is":[75,87,94],"to":[77],"generate":[78],"user's":[80,107],"key,":[82],"a":[83],"random":[85,125],"matrix":[86],"introduced,":[88],"key":[93],"generated":[95],"by":[96],"running":[97],"preimage":[99],"sampling":[100],"(SamplePre)":[102],"based":[103,128],"on":[104,129],"signed":[106],"Finally,":[110],"proves":[113],"unconditional":[115],"anonymity,":[116],"unforgeability":[117],"under":[123],"oracle":[126],"model":[127],"small":[131],"integer":[132],"solution(SIS)":[133],"difficulty":[134],"assumption.":[135]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
