{"id":"https://openalex.org/W4410219460","doi":"https://doi.org/10.1186/s42400-024-00344-3","title":"Adaptively secure, splittable, and robust threshold unsigncryption","display_name":"Adaptively secure, splittable, and robust threshold unsigncryption","publication_year":2025,"publication_date":"2025-05-10","ids":{"openalex":"https://openalex.org/W4410219460","doi":"https://doi.org/10.1186/s42400-024-00344-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00344-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00344-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00344-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00344-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000173099","display_name":"Yuxin Tong","orcid":"https://orcid.org/0000-0002-2775-6057"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxin Tong","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100622907","display_name":"Shimin Li","orcid":"https://orcid.org/0000-0001-7562-4852"},"institutions":[{"id":"https://openalex.org/I4210142167","display_name":"DigitalSpace (United States)","ror":"https://ror.org/04h1th525","country_code":"US","type":"company","lineage":["https://openalex.org/I4210142167"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shimin Li","raw_affiliation_strings":["CETC Cyberspace Security Technology Co., Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"CETC Cyberspace Security Technology Co., Ltd., Beijing, China","institution_ids":["https://openalex.org/I4210142167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688542","display_name":"Zhiwei Wang","orcid":"https://orcid.org/0000-0002-3053-4279"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Wang","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422048","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4221-1311"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079155690","display_name":"Rui Xue","orcid":"https://orcid.org/0000-0001-6024-3635"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Xue","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000173099"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.2845,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88703188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5694980025291443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5694980025291443}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00344-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00344-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00344-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8e744c0c9a6740b7939cd19a46b182a6","is_oa":true,"landing_page_url":"https://doaj.org/article/8e744c0c9a6740b7939cd19a46b182a6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-24 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00344-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00344-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00344-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410219460.pdf","grobid_xml":"https://content.openalex.org/works/W4410219460.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W174706587","https://openalex.org/W1484751769","https://openalex.org/W1500967513","https://openalex.org/W1502629466","https://openalex.org/W1510433380","https://openalex.org/W1513652919","https://openalex.org/W1516634197","https://openalex.org/W1522101599","https://openalex.org/W1523616062","https://openalex.org/W1524587198","https://openalex.org/W1524651855","https://openalex.org/W1528330226","https://openalex.org/W1546996295","https://openalex.org/W1551345971","https://openalex.org/W1551365751","https://openalex.org/W1605305207","https://openalex.org/W1646354800","https://openalex.org/W1730634423","https://openalex.org/W1798609567","https://openalex.org/W1832688593","https://openalex.org/W1977254827","https://openalex.org/W2022364240","https://openalex.org/W2040325382","https://openalex.org/W2097638666","https://openalex.org/W2100647543","https://openalex.org/W2116881075","https://openalex.org/W2121786567","https://openalex.org/W2123510989","https://openalex.org/W2130708931","https://openalex.org/W2138157523","https://openalex.org/W2139910984","https://openalex.org/W2141420453","https://openalex.org/W2153193245","https://openalex.org/W2162297089","https://openalex.org/W2553382123","https://openalex.org/W2592817897","https://openalex.org/W2794501668","https://openalex.org/W2889930821","https://openalex.org/W2984459379","https://openalex.org/W2997030953","https://openalex.org/W3043512232","https://openalex.org/W3137533294","https://openalex.org/W3162638080","https://openalex.org/W4210531213","https://openalex.org/W4212974603","https://openalex.org/W4221124508","https://openalex.org/W4230099306","https://openalex.org/W4247178549","https://openalex.org/W4308642224","https://openalex.org/W4312551118","https://openalex.org/W4378194766","https://openalex.org/W4385654497","https://openalex.org/W4389844109","https://openalex.org/W4395961039","https://openalex.org/W4401666635","https://openalex.org/W4402264238"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"As":[1,73,273],"a":[2,16,56,74,237,244,274,286],"variant":[3],"of":[4,154,217,260],"the":[5,25,62,70,79,110,123,147,159,166,174,182,211,253,258,266],"signcryption":[6],"scheme,":[7,280],"threshold":[8,22,99,119,155,254,267,278],"unsigncryption":[9,26,100,120,156,255,279],"operates":[10],"among":[11],"multiple":[12],"receiver":[13,246],"members":[14],"through":[15],"(":[17,114],"t":[18,115,268],",":[19,116],"n":[20,117,262],")":[21,118],"process":[23],"during":[24,137],"phase":[27,256],"to":[28,67,81,170,251,271],"improve":[29],"security":[30,54,152,180,223],"and":[31,33,46,151,199,205,225,265,301],"robustness,":[32,196],"has":[34],"been":[35],"widely":[36],"deployed":[37],"in":[38,122,181,296],"various":[39],"applications":[40],"such":[41,193,305],"as":[42,194,306],"cloud":[43],"computing,":[44],"blockchain,":[45],"electronic":[47,307],"auctions.":[48],"However,":[49],"existing":[50],"schemes":[51,77,101,157],"only":[52,247,284],"consider":[53],"under":[55,158,230],"limited":[57],"static":[58],"corruption":[59,128,161],"model,":[60],"where":[61],"adversary":[63],"selects":[64],"which":[65],"parties":[66,133],"corrupt":[68,132],"before":[69],"protocol":[71,138],"begins.":[72],"result,":[75],"these":[76],"lack":[78],"flexibility":[80],"address":[82],"more":[83],"complex":[84],"attack":[85],"forms":[86],"posed":[87],"by":[88],"real-world":[89],"adversaries.":[90],"To":[91],"solve":[92],"this":[93,106],"issue,":[94],"it":[95],"is":[96,188,263],"worth":[97],"investigating":[98],"with":[102,190,221,241],"adaptive":[103,127,160,179],"security.":[104],"In":[105],"paper,":[107],"we":[108,145,164,209],"propose":[109],"first":[111],"provably":[112],"secure":[113,277],"scheme":[121,176,187,213],"standard":[124,183],"model":[125,153],"against":[126],"adversaries":[129],"who":[130],"can":[131,177],"at":[134],"any":[135],"time":[136],"execution.":[139],"The":[140],"main":[141],"contributions":[142],"include:":[143],"First,":[144],"provide":[146],"formal":[148],"syntactic":[149],"definition":[150],"model.":[162,184],"Second,":[163],"employ":[165],"dual":[167],"system":[168],"technique":[169],"formally":[171],"prove":[172],"that":[173,235],"proposed":[175,212],"achieve":[178],"Notably,":[185],"our":[186,281],"equipped":[189],"valuable":[191],"properties":[192],"non-interactivity,":[195],"public":[197],"verifiability,":[198],"splittable":[200],"unsigncryption,":[201],"significantly":[202],"enhancing":[203],"usability":[204],"functional":[206],"completeness.":[207],"Besides,":[208],"implement":[210],"on":[214,236],"two":[215],"types":[216],"elliptic":[218],"curve":[219],"groups":[220],"different":[222,231],"levels":[224,300],"evaluate":[226],"its":[227,294],"practical":[228],"performance":[229],"thresholds.":[232],"Experiments":[233],"demonstrate":[234],"composite":[238],"order":[239],"group":[240],"80-bit":[242],"security,":[243],"single":[245],"takes":[248],"16.61":[249],"s":[250],"perform":[252],"when":[257],"number":[259],"receivers":[261],"20":[264],"reaches":[269],"up":[270],"18.":[272],"pioneering":[275],"adaptively":[276],"work":[282],"not":[283],"establishes":[285],"benchmark":[287],"for":[288],"future":[289],"proposals":[290],"but":[291],"also":[292],"broadens":[293],"application":[295],"scenarios":[297],"requiring":[298],"high-security":[299],"flexible":[302],"key":[303],"management,":[304],"voting.":[308]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
