{"id":"https://openalex.org/W4383263082","doi":"https://doi.org/10.3390/cryptography7030033","title":"Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices","display_name":"Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices","publication_year":2023,"publication_date":"2023-07-04","ids":{"openalex":"https://openalex.org/W4383263082","doi":"https://doi.org/10.3390/cryptography7030033"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7030033","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/cryptography7030033","pdf_url":"https://www.mdpi.com/2410-387X/7/3/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/3/33/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067484393","display_name":"Anton Leevik","orcid":"https://orcid.org/0000-0003-1823-7877"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Anton Leevik","raw_affiliation_strings":["Faculty of Secure Information Technologies, ITMO University, 197101 Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Secure Information Technologies, ITMO University, 197101 Saint Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053820290","display_name":"Vadim Davydov","orcid":"https://orcid.org/0000-0002-5544-2434"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Vadim Davydov","raw_affiliation_strings":["Faculty of Secure Information Technologies, ITMO University, 197101 Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Secure Information Technologies, ITMO University, 197101 Saint Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087480596","display_name":"Sergey Bezzateev","orcid":"https://orcid.org/0000-0002-0924-6221"},"institutions":[{"id":"https://openalex.org/I130523015","display_name":"Saint Petersburg State University of Aerospace and Instrumentation","ror":"https://ror.org/02rsxaa93","country_code":"RU","type":"education","lineage":["https://openalex.org/I130523015"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Sergey Bezzateev","raw_affiliation_strings":["Department of Information Security, State University of Aerospace Instrumentation, 190000 Saint Petersubrg, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, State University of Aerospace Instrumentation, 190000 Saint Petersubrg, Russia","institution_ids":["https://openalex.org/I130523015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067484393"],"corresponding_institution_ids":["https://openalex.org/I173089394"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.5315,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71108448,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"7","issue":"3","first_page":"33","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6857223510742188},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6728882193565369},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5611845254898071},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5352151393890381},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.523591160774231},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4714677631855011},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.43191012740135193},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.41213130950927734},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3851797580718994},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3734564781188965},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3372254967689514},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31256651878356934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2986857295036316},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.26066672801971436},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.22072523832321167},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17472577095031738},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.17197659611701965}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6857223510742188},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6728882193565369},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5611845254898071},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5352151393890381},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.523591160774231},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4714677631855011},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.43191012740135193},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.41213130950927734},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3851797580718994},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3734564781188965},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3372254967689514},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31256651878356934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2986857295036316},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.26066672801971436},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.22072523832321167},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17472577095031738},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.17197659611701965},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography7030033","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/cryptography7030033","pdf_url":"https://www.mdpi.com/2410-387X/7/3/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5db820bbfb6746bf97d91035a2ea1011","is_oa":true,"landing_page_url":"https://doaj.org/article/5db820bbfb6746bf97d91035a2ea1011","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 3, p 33 (2023)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/7/3/33/","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030033","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography; Volume 7; Issue 3; Pages: 33","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography7030033","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/cryptography7030033","pdf_url":"https://www.mdpi.com/2410-387X/7/3/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4383263082.pdf","grobid_xml":"https://content.openalex.org/works/W4383263082.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W57720693","https://openalex.org/W74973629","https://openalex.org/W1536729852","https://openalex.org/W1969012565","https://openalex.org/W1983041524","https://openalex.org/W1985439922","https://openalex.org/W2007466965","https://openalex.org/W2013794527","https://openalex.org/W2037705623","https://openalex.org/W2038761522","https://openalex.org/W2044529829","https://openalex.org/W2071825329","https://openalex.org/W2077244027","https://openalex.org/W2085854733","https://openalex.org/W2095708839","https://openalex.org/W2141420453","https://openalex.org/W2142048307","https://openalex.org/W2154384778","https://openalex.org/W2155209387","https://openalex.org/W2168676717","https://openalex.org/W2169194339","https://openalex.org/W2177209050","https://openalex.org/W2186322683","https://openalex.org/W2336429628","https://openalex.org/W2526932592","https://openalex.org/W2610964475","https://openalex.org/W2741654699","https://openalex.org/W2784017372","https://openalex.org/W2791664942","https://openalex.org/W2971167507","https://openalex.org/W2971337410","https://openalex.org/W3106792794","https://openalex.org/W3109885655","https://openalex.org/W3118046153","https://openalex.org/W4220964700","https://openalex.org/W4226019741","https://openalex.org/W4226146327","https://openalex.org/W4297991408","https://openalex.org/W4308641887","https://openalex.org/W4362520438","https://openalex.org/W4366316053","https://openalex.org/W6603033481","https://openalex.org/W6632073001","https://openalex.org/W6727597331","https://openalex.org/W6851158622","https://openalex.org/W6851710735"],"related_works":["https://openalex.org/W2364749687","https://openalex.org/W2357918347","https://openalex.org/W2095955323","https://openalex.org/W4210288534","https://openalex.org/W2157874741","https://openalex.org/W2374799070","https://openalex.org/W2789938266","https://openalex.org/W2614231924","https://openalex.org/W2897778975","https://openalex.org/W1498632344"],"abstract_inverted_index":{"This":[0,31],"paper":[1],"presents":[2],"a":[3,37,58],"new":[4],"threshold":[5],"signature":[6,20],"scheme":[7,14,32,52],"based":[8],"on":[9,45,57,76],"Damgaard\u2019s":[10],"work.":[11],"The":[12,72],"proposed":[13],"allows":[15],"for":[16],"changing":[17],"the":[18,24,27,46,66,77,81,89],"message":[19],"threshold,":[21],"thereby":[22],"improving":[23],"flexibility":[25],"of":[26,48,80],"original":[28],"Damgaard":[29],"scheme.":[30],"can":[33],"be":[34],"applied":[35],"as":[36,86,88],"user":[38],"authentication":[39,70],"system":[40],"using":[41],"wearable":[42],"devices.":[43],"Based":[44],"hardness":[47],"lattice":[49],"problems,":[50,85],"this":[51],"is":[53,62],"resistant":[54],"to":[55],"attacks":[56],"quantum":[59],"computer,":[60],"which":[61],"an":[63],"advantage":[64],"over":[65],"currently":[67],"used":[68],"multi-factor":[69],"schemes.":[71],"scheme\u2019s":[73,93],"security":[74],"relies":[75],"computational":[78],"complexity":[79],"Module-LWE":[82],"and":[83],"Module-SIS":[84],"well":[87],"Shamir":[90],"secret":[91],"sharing":[92],"security.":[94]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-10T00:00:00"}
