{"id":"https://openalex.org/W4414366774","doi":"https://doi.org/10.1186/s42400-025-00371-8","title":"Faster threshold-SM2 with identifiable abort and non-interactive online signing","display_name":"Faster threshold-SM2 with identifiable abort and non-interactive online signing","publication_year":2025,"publication_date":"2025-09-19","ids":{"openalex":"https://openalex.org/W4414366774","doi":"https://doi.org/10.1186/s42400-025-00371-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00371-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00371-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00371-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00371-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103155574","display_name":"Yao Lv","orcid":"https://orcid.org/0000-0003-0347-321X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunlv Lv","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422048","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4221-1311"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yang Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Tao","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101370839","display_name":"Zeshuo Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeshuo Zhu","raw_affiliation_strings":["Cloud Architecture Platform Department, Tencent Technology (Beijing) Co. Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Cloud Architecture Platform Department, Tencent Technology (Beijing) Co. Ltd., Beijing, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103155574"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12998546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/abort","display_name":"Abort","score":0.9179999828338623},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.685699999332428},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6484000086784363},{"id":"https://openalex.org/keywords/chen","display_name":"Chen","score":0.6014999747276306},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.557200014591217},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5389000177383423},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49000000953674316}],"concepts":[{"id":"https://openalex.org/C2777549182","wikidata":"https://www.wikidata.org/wiki/Q15117556","display_name":"Abort","level":2,"score":0.9179999828338623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7476000189781189},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.685699999332428},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6484000086784363},{"id":"https://openalex.org/C2776085556","wikidata":"https://www.wikidata.org/wiki/Q183361","display_name":"Chen","level":2,"score":0.6014999747276306},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.557200014591217},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5389000177383423},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49000000953674316},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46709999442100525},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33880001306533813},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.30869999527931213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.27469998598098755}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00371-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00371-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00371-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0be16f24ef7b4d45a632e07b15a1753c","is_oa":true,"landing_page_url":"https://doaj.org/article/0be16f24ef7b4d45a632e07b15a1753c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-14 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00371-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00371-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00371-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1575868368","display_name":null,"funder_award_id":"Chinese Academy of Sciences","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2546462607","display_name":"\u5199\u771f\u304a\u3088\u3073\u7c21\u6613\u6e2c\u5b9a\u5668\u306b\u3088\u308b\u592a\u967d\u30fb\u6708\u306e\u4f4d\u7f6e\u306e\u6e2c\u5b9a\u3068\u305d\u306e\u6559\u6750\u5316\u306b\u3064\u3044\u3066","funder_award_id":"23047","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4061967014","display_name":null,"funder_award_id":"U2336205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5326810415","display_name":null,"funder_award_id":"62172411","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5640883929","display_name":null,"funder_award_id":"Research Fellow","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6402724206","display_name":"\u5316\u5b66\u306e\u57fa\u672c\u6982\u5ff5\u3092\u80b2\u6210\u3059\u308b\u305f\u3081\u306e\u52b9\u679c\u7684\u306a\u5b66\u7fd2\u6307\u5c0e\u306e\u7814\u7a76-\u5c0f\u4e2d\u9ad8\u7b49\u5b66\u6821\u306e\u95a2\u9023\u3092\u91cd\u8996\u3057\u3066-","funder_award_id":"92304","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G7752643416","display_name":null,"funder_award_id":"Japan","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8023794799","display_name":"\u5730\u57df\u958b\u767a\u306e\u305f\u3081\u306e\u8a08\u753b\u5206\u6790\u30e2\u30c7\u30eb","funder_award_id":"31100","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320311508","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414366774.pdf","grobid_xml":"https://content.openalex.org/works/W4414366774.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1589034595","https://openalex.org/W1867048327","https://openalex.org/W2031714952","https://openalex.org/W2075826899","https://openalex.org/W2090903439","https://openalex.org/W2095708839","https://openalex.org/W2108834246","https://openalex.org/W2132172731","https://openalex.org/W2168970529","https://openalex.org/W2890219821","https://openalex.org/W2890748062","https://openalex.org/W2912577494","https://openalex.org/W2933493434","https://openalex.org/W2994832897","https://openalex.org/W3021332472","https://openalex.org/W3043942351","https://openalex.org/W3108205245","https://openalex.org/W3108672920","https://openalex.org/W3164210535","https://openalex.org/W3215175885","https://openalex.org/W4232836212","https://openalex.org/W4296986457","https://openalex.org/W4324007517","https://openalex.org/W4385781481","https://openalex.org/W4392140872"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Threshold":[1],"signatures":[2,44],"are":[3],"essential":[4],"for":[5,81],"fault-tolerant":[6],"applications":[7],"among":[8],"groups":[9],"of":[10],"users,":[11],"such":[12,38],"as":[13,39],"in":[14,23,91,116],"blockchain":[15],"transactions.":[16],"SM2":[17],"is":[18,31,114],"a":[19,68,79,92,100,105],"digital":[20],"signature":[21],"standard":[22],"China":[24],"and":[25,49,73,121,128,144,154],"ISO,":[26],"yet":[27],"its":[28,60],"threshold":[29,43],"variant":[30],"less":[32],"developed":[33],"compared":[34,147],"to":[35,99,148],"international":[36],"alternatives":[37],"ECDSA.":[40],"Specifically,":[41],"modern":[42],"offer":[45],"identifiable":[46],"abort":[47],"(ID-abort)":[48],"non-interactive":[50,74,106],"online":[51,75,107],"signing,":[52],"but":[53],"these":[54],"features":[55],"make":[56],"threshold-SM2":[57,70,113,134,151],"costly,":[58],"limiting":[59],"real-world":[61],"application.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,103],"introduce":[67],"fast":[69],"with":[71,138],"ID-abort":[72,82],"signing.":[76,108],"We":[77,109],"design":[78],"technology":[80],"by":[83,152],"checking":[84],"hard-to-verify":[85],"pseudononces":[86],"based":[87],"on":[88],"their":[89],"mappings":[90],"group.":[93],"By":[94],"putting":[95],"the":[96,117,149],"message-independent":[97],"computations":[98],"presigning":[101],"phase,":[102],"achieve":[104],"prove":[110],"that":[111,132],"our":[112,133],"secure":[115],"dishonest":[118],"majority":[119],"model":[120],"implement":[122],"it":[123],"using":[124],"Golang.":[125],"Theoretical":[126],"analysis":[127],"experimental":[129],"results":[130],"demonstrate":[131],"provides":[135],"rich":[136],"functionalities":[137],"good":[139],"performance,":[140],"significantly":[141],"reducing":[142],"computational":[143],"communication":[145],"costs":[146],"state-of-the-art":[150],"Liang":[153],"Chen":[155],"(FCS\u2019":[156],"24).":[157]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
