{"id":"https://openalex.org/W4400948408","doi":"https://doi.org/10.1145/3672919.3672935","title":"A Certificateless Aggregate Signature Scheme without Bilinear Pairing","display_name":"A Certificateless Aggregate Signature Scheme without Bilinear Pairing","publication_year":2024,"publication_date":"2024-03-01","ids":{"openalex":"https://openalex.org/W4400948408","doi":"https://doi.org/10.1145/3672919.3672935"},"language":"en","primary_location":{"id":"doi:10.1145/3672919.3672935","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110300292","display_name":"Jun Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145476","display_name":"Chinese People 's Liberation Army No. 85 Hospital","ror":"https://ror.org/04bda0170","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210145476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Shen","raw_affiliation_strings":["No. 92578 Unit of Chinese People45s Liberation Army, China"],"raw_orcid":"https://orcid.org/0009-0006-3537-2359","affiliations":[{"raw_affiliation_string":"No. 92578 Unit of Chinese People45s Liberation Army, China","institution_ids":["https://openalex.org/I4210145476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kai Wang","orcid":"https://orcid.org/0009-0005-0458-7560"},"institutions":[{"id":"https://openalex.org/I4210145476","display_name":"Chinese People 's Liberation Army No. 85 Hospital","ror":"https://ror.org/04bda0170","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210145476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Wang","raw_affiliation_strings":["No. 92578 Unit of Chinese People45s Liberation Army, China"],"raw_orcid":"https://orcid.org/0009-0005-0458-7560","affiliations":[{"raw_affiliation_string":"No. 92578 Unit of Chinese People45s Liberation Army, China","institution_ids":["https://openalex.org/I4210145476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009445804","display_name":"Zhong Zhi Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145476","display_name":"Chinese People 's Liberation Army No. 85 Hospital","ror":"https://ror.org/04bda0170","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210145476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Lv","raw_affiliation_strings":["No. 92578 Unit of Chinese People45s Liberation Army, China"],"raw_orcid":"https://orcid.org/0009-0007-6211-5320","affiliations":[{"raw_affiliation_string":"No. 92578 Unit of Chinese People45s Liberation Army, China","institution_ids":["https://openalex.org/I4210145476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Yu","orcid":"https://orcid.org/0009-0004-5377-5608"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jie Yu","raw_affiliation_strings":["Beijing Research Institute of Telemetry, China"],"raw_orcid":"https://orcid.org/0009-0004-5377-5608","affiliations":[{"raw_affiliation_string":"Beijing Research Institute of Telemetry, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100711130","display_name":"Yue Cui","orcid":"https://orcid.org/0000-0002-5939-8717"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Cui","raw_affiliation_strings":["Beijing Research Institute of Telemetry, China"],"raw_orcid":"https://orcid.org/0000-0002-5939-8717","affiliations":[{"raw_affiliation_string":"Beijing Research Institute of Telemetry, China","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Jianxue Zheng","orcid":"https://orcid.org/0009-0005-2533-5856"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianxue Zheng","raw_affiliation_strings":["Beijing Research Institute of Telemetry, China"],"raw_orcid":"https://orcid.org/0009-0005-2533-5856","affiliations":[{"raw_affiliation_string":"Beijing Research Institute of Telemetry, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5110300292"],"corresponding_institution_ids":["https://openalex.org/I4210145476"],"apc_list":null,"apc_paid":null,"fwci":0.9934,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79644922,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"86","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.6719288229942322},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.614505410194397},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5661290884017944},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5609930753707886},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.5446736812591553},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5268068313598633},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47578608989715576},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33296817541122437},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2270309031009674},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09043776988983154},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.051821380853652954}],"concepts":[{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.6719288229942322},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.614505410194397},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5661290884017944},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5609930753707886},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.5446736812591553},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5268068313598633},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47578608989715576},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33296817541122437},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2270309031009674},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09043776988983154},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.051821380853652954},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672919.3672935","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2320588269","https://openalex.org/W3012425590","https://openalex.org/W3014081334","https://openalex.org/W3080871722","https://openalex.org/W3085704645","https://openalex.org/W3197053988"],"related_works":["https://openalex.org/W3015473028","https://openalex.org/W3201176751","https://openalex.org/W1993094293","https://openalex.org/W2029180842","https://openalex.org/W2024971119","https://openalex.org/W2057898405","https://openalex.org/W2953807518","https://openalex.org/W2258335979","https://openalex.org/W2890366349","https://openalex.org/W3119345543"],"abstract_inverted_index":{"Currently,":[0],"the":[1,18,21,35,54,59,76,84,88,96,103,109,115,119,126],"aggregate":[2,70,81],"signature":[3,30,71,89],"schemes":[4],"were":[5],"mostly":[6],"designed":[7],"by":[8],"bilinear":[9],"pairing,":[10],"which":[11,128],"leads":[12],"to":[13,67,100],"high":[14],"computational":[15],"overhead.":[16],"Considering":[17],"environment":[19],"of":[20,39,53,90,105],"space-ground":[22],"integrated":[23],"network,":[24],"we":[25,33],"propose":[26],"a":[27,43],"certificateless":[28,80],"aggregated":[29],"scheme,":[31],"and":[32,37,73,95,122],"prove":[34],"security":[36],"unforgeability":[38],"our":[40,91,112],"scheme":[41,63,92,113],"using":[42],"random":[44],"oracle":[45],"model,":[46],"where":[47],"an":[48,51,69],"adversary":[49],"has":[50,93,98,129],"ability":[52],"adaptive":[55],"chosen-message":[56],"attack.":[57],"At":[58],"same":[60],"time,":[61],"this":[62],"does":[64],"not":[65],"need":[66],"specify":[68],"verifier,":[72],"breaks":[74],"through":[75],"linear":[77],"relationship":[78],"between":[79],"signatures":[82],"in":[83],"traditional":[85],"scheme.":[86],"Therefore,":[87],"compactness,":[94],"length":[97],"nothing":[99],"do":[101],"with":[102,108],"number":[104],"users.":[106],"Compared":[107],"existing":[110],"schemes,":[111],"improves":[114],"verification":[116],"efficiency,":[117],"reduces":[118],"computing":[120],"overhead,":[121],"is":[123],"suitable":[124],"for":[125],"network":[127],"tight":[130],"resources.":[131]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
