{"id":"https://openalex.org/W2972520983","doi":"https://doi.org/10.4018/ijisp.2019100106","title":"An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps","display_name":"An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps","publication_year":2019,"publication_date":"2019-09-13","ids":{"openalex":"https://openalex.org/W2972520983","doi":"https://doi.org/10.4018/ijisp.2019100106","mag":"2972520983"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.2019100106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijisp.2019100106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=237212&isxn=9781522564638","source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=237212&isxn=9781522564638","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100747929","display_name":"Pankaj Kumar","orcid":"https://orcid.org/0000-0002-4589-3573"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pankaj Kumar","raw_affiliation_strings":["School of Computing Science and Engineering, Galgotias University, Delhi, India"],"affiliations":[{"raw_affiliation_string":"School of Computing Science and Engineering, Galgotias University, Delhi, India","institution_ids":["https://openalex.org/I155125381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111279977","display_name":"Vishnu Sharma","orcid":null},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vishnu Sharma","raw_affiliation_strings":["Amity School of Engineering, Amity University, Noida, India"],"affiliations":[{"raw_affiliation_string":"Amity School of Engineering, Amity University, Noida, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101859506","display_name":"Gaurav Sharma","orcid":"https://orcid.org/0000-0003-2842-3788"},"institutions":[{"id":"https://openalex.org/I132053463","display_name":"Universit\u00e9 Libre de Bruxelles","ror":"https://ror.org/01r9htc13","country_code":"BE","type":"education","lineage":["https://openalex.org/I132053463"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Gaurav Sharma","raw_affiliation_strings":["D\u00e9partement d'Informatique, Universit\u00e9 Libre de Bruxelles, Bruxelles, Belgium"],"affiliations":[{"raw_affiliation_string":"D\u00e9partement d'Informatique, Universit\u00e9 Libre de Bruxelles, Bruxelles, Belgium","institution_ids":["https://openalex.org/I132053463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071117578","display_name":"Tarunpreet Bhatia","orcid":"https://orcid.org/0000-0003-0434-2799"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Tarunpreet Bhatia","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100747929"],"corresponding_institution_ids":["https://openalex.org/I155125381"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56878296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"13","issue":"4","first_page":"89","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.9356440305709839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7695667743682861},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6672224402427673},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6610729694366455},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5463855266571045},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.5298823118209839},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.49896883964538574},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.49442434310913086},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.48116859793663025},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47197896242141724},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.4326087236404419},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.42363056540489197},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3812459111213684},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15440848469734192},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1385541558265686},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.05679801106452942}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.9356440305709839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7695667743682861},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6672224402427673},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6610729694366455},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5463855266571045},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.5298823118209839},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.49896883964538574},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.49442434310913086},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.48116859793663025},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47197896242141724},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4326087236404419},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.42363056540489197},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3812459111213684},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15440848469734192},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1385541558265686},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.05679801106452942},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijisp.2019100106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijisp.2019100106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=237212&isxn=9781522564638","source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:13:y:2019:i:4:p:89-108","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2019100106","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:dipot.ulb.ac.be:2013/318422","is_oa":true,"landing_page_url":"http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/318422","pdf_url":null,"source":{"id":"https://openalex.org/S4306401063","display_name":"D\u00e9p\u00f4t institutionnel de l'Universit\u00e9 libre de Bruxelles (Universit\u00e9 Libre de Bruxelles)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132053463","host_organization_name":"Universit\u00e9 Libre de Bruxelles","host_organization_lineage":["https://openalex.org/I132053463"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security and Privacy, 13 (4","raw_type":"info:ulb-repo/semantics/openurl/article"}],"best_oa_location":{"id":"doi:10.4018/ijisp.2019100106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijisp.2019100106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=237212&isxn=9781522564638","source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2972520983.pdf","grobid_xml":"https://content.openalex.org/works/W2972520983.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W64710386","https://openalex.org/W1525576396","https://openalex.org/W1569083856","https://openalex.org/W1591524234","https://openalex.org/W1605032032","https://openalex.org/W1788452017","https://openalex.org/W1959942577","https://openalex.org/W2012382733","https://openalex.org/W2012902875","https://openalex.org/W2013752865","https://openalex.org/W2014204696","https://openalex.org/W2033607738","https://openalex.org/W2035204644","https://openalex.org/W2040987689","https://openalex.org/W2056442302","https://openalex.org/W2063444275","https://openalex.org/W2075012519","https://openalex.org/W2093778656","https://openalex.org/W2095995861","https://openalex.org/W2147055867","https://openalex.org/W2168811559","https://openalex.org/W2283945092","https://openalex.org/W2399716882","https://openalex.org/W2403351145"],"related_works":["https://openalex.org/W2981921609","https://openalex.org/W3022070214","https://openalex.org/W4382597878","https://openalex.org/W1605032032","https://openalex.org/W2369678925","https://openalex.org/W2102517938","https://openalex.org/W2393537119","https://openalex.org/W4239074508","https://openalex.org/W2057152612","https://openalex.org/W2383973888"],"abstract_inverted_index":{"Certificateless":[0],"signature":[1,34,86],"schemes":[2],"are":[3],"a":[4,106,121],"very":[5],"intriguing":[6],"aspect":[7],"in":[8,23,58,93,102,120],"information":[9],"security":[10,48,91,101],"because":[11],"of":[12,15,47,61,74,125],"its":[13],"capability":[14],"removing":[16],"the":[17,51,59,90,100,111,129],"well-known":[18],"key":[19],"escrow":[20],"problem":[21],"predominately":[22],"ID-based":[24],"cryptography.":[25],"He":[26,75,94],"et":[27,76,95],"al.":[28],"proposed":[29],"an":[30,82],"efficient":[31,83,119],"certificateless":[32,84],"aggregate":[33,85],"scheme":[35,40,87,97,104,115,127],"and":[36,67,98,109],"proved":[37],"that":[38,113],"their":[39,103,114,126],"is":[41,116],"secure":[42],"against":[43,63,128],"all":[44],"possible":[45],"types":[46],"attacks.":[49],"However,":[50],"authors":[52,80],"still":[53],"managed":[54],"to":[55],"find":[56],"loopholes":[57],"form":[60],"insecurities":[62],"\u2018honest":[64],"but":[65,69],"curious'":[66],"\u2018malicious":[68],"passive'":[70],"attacks":[71],"during":[72],"cryptanalysis":[73],"al.'s":[77,96],"scheme.":[78],"The":[79],"propose":[81],"which":[88],"fills":[89],"gaps":[92],"demonstrate":[99],"via":[105],"mathematical":[107],"proof,":[108],"reinforce":[110],"fact":[112],"much":[117],"more":[118],"thorough":[122],"performance":[123],"comparison":[124],"previous":[130],"schemes.":[131]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
