{"id":"https://openalex.org/W4323026776","doi":"https://doi.org/10.1504/ijahuc.2023.10054520","title":"Efficient multi-receiver signcryption scheme based on ring signature","display_name":"Efficient multi-receiver signcryption scheme based on ring signature","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4323026776","doi":"https://doi.org/10.1504/ijahuc.2023.10054520"},"language":"en","primary_location":{"id":"doi:10.1504/ijahuc.2023.10054520","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2023.10054520","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Ad Hoc and Ubiquitous Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101927249","display_name":"Yong Xie","orcid":"https://orcid.org/0009-0003-1575-4104"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Xie","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029976375","display_name":"Ruijiang Ma","orcid":"https://orcid.org/0000-0001-5777-3846"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruijiang Ma","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070889054","display_name":"Pengfei Su","orcid":"https://orcid.org/0000-0003-2069-7485"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Su","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062362183","display_name":"Muhammad Israr","orcid":"https://orcid.org/0000-0001-8566-3257"},"institutions":[{"id":"https://openalex.org/I263208278","display_name":"Hazara University","ror":"https://ror.org/018y22094","country_code":"PK","type":"education","lineage":["https://openalex.org/I263208278"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Israr","raw_affiliation_strings":["Department of Computer Sciences, Hazara University, Mansehra, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Hazara University, Mansehra, Pakistan","institution_ids":["https://openalex.org/I263208278"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101927249"],"corresponding_institution_ids":["https://openalex.org/I116265982"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01786376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"42","issue":"3","first_page":"175","last_page":"175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9340019822120667},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8426669239997864},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.7205979824066162},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7038823366165161},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6181250810623169},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5098068118095398},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35886043310165405},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34065741300582886},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3395559787750244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32352912425994873},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23968252539634705},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22667309641838074},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11680442094802856}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9340019822120667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8426669239997864},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.7205979824066162},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7038823366165161},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6181250810623169},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5098068118095398},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35886043310165405},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34065741300582886},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3395559787750244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32352912425994873},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23968252539634705},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22667309641838074},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11680442094802856},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijahuc.2023.10054520","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2023.10054520","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Ad Hoc and Ubiquitous Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1973681805","https://openalex.org/W2015242147","https://openalex.org/W2551652499","https://openalex.org/W2606299826","https://openalex.org/W1975565534","https://openalex.org/W2369737298","https://openalex.org/W2108122086","https://openalex.org/W2117844633","https://openalex.org/W2368246243","https://openalex.org/W2324854718"],"abstract_inverted_index":{"With":[0],"the":[1,5,8,11,38,44,48,92,96,100,106,110,113,116,119,127,138,142],"development":[2],"of":[3,7,10,14,50,70,74,94,102,112,118,141],"society,":[4],"problem":[6],"disclosure":[9],"identity":[12,98],"information":[13],"whistleblowers":[15],"has":[16],"become":[17,28],"more":[18,20,54],"and":[19,43,115,134],"prominent,":[21],"resulting":[22],"in":[23,47,68,87,99],"few":[24],"people":[25],"willing":[26],"to":[27,36,108],"whistleblowers.":[29],"Anonymous":[30],"signcryption":[31,46,79],"schemes":[32,58],"can":[33],"be":[34],"used":[35],"solve":[37],"problems":[39],"faced":[40],"by":[41,105],"whistleblowers,":[42],"multi-receiver":[45,78],"form":[49],"one-to-many":[51],"communication":[52],"is":[53,85,130,145],"suitable.":[55],"Existing":[56],"related":[57],"all":[59],"use":[60],"bilinear":[61],"or":[62],"exponential":[63],"operations,":[64],"which":[65],"are":[66],"impractical":[67],"terms":[69],"whistleblower":[71],"application":[72],"because":[73],"complexity.":[75],"An":[76],"efficient":[77],"scheme":[80,129,144],"based":[81],"on":[82],"ring":[83],"signature":[84],"proposed":[86,128,143],"this":[88],"paper.":[89],"It":[90],"adopts":[91],"method":[93],"hiding":[95],"sender's":[97],"set":[101],"identities":[103],"trusted":[104],"receivers":[107],"realise":[109],"anonymity":[111],"sender":[114],"reliability":[117],"sender.":[120],"A":[121],"strict":[122],"security":[123],"proof":[124],"shows":[125],"that":[126,137],"secure.":[131],"Complexity":[132],"analysis":[133],"comparison":[135],"show":[136],"efficiency":[139],"advantage":[140],"obvious.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
