{"id":"https://openalex.org/W2290554993","doi":"https://doi.org/10.1109/iih-msp.2015.55","title":"Security Analysis on \"Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model\"","display_name":"Security Analysis on \"Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model\"","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2290554993","doi":"https://doi.org/10.1109/iih-msp.2015.55","mag":"2290554993"},"language":"en","primary_location":{"id":"doi:10.1109/iih-msp.2015.55","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2015.55","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036428620","display_name":"Feng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]},{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Wang","raw_affiliation_strings":["College of Mathematics and Physics, Fujian University of Technology, Fuzhou, Fujian, China","Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Physics, Fujian University of Technology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019810689","display_name":"Jeng\u2010Shyang Pan","orcid":"https://orcid.org/0000-0002-3128-9025"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jeng-Shyang Pan","raw_affiliation_strings":["College of Information Science and Engineering, Fujian University of Technology, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Fujian University of Technology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I83791580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036428620"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I83791580"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.10040471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"195","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.9090496301651001},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7402828931808472},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7289669513702393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7081522345542908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6073216199874878},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6051263213157654},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4363923966884613},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4140096604824066},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.41376975178718567},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.2812766134738922},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1283082365989685},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1277698576450348}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.9090496301651001},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7402828931808472},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7289669513702393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7081522345542908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6073216199874878},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6051263213157654},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4363923966884613},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4140096604824066},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.41376975178718567},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.2812766134738922},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1283082365989685},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1277698576450348},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iih-msp.2015.55","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2015.55","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1481068248","https://openalex.org/W1497727788","https://openalex.org/W1569083856","https://openalex.org/W1588416948","https://openalex.org/W1591524234","https://openalex.org/W1995046905","https://openalex.org/W2050881117","https://openalex.org/W2052267638","https://openalex.org/W2056442302","https://openalex.org/W2081539093","https://openalex.org/W2101803085","https://openalex.org/W2152688060","https://openalex.org/W6629914159","https://openalex.org/W6634010886"],"related_works":["https://openalex.org/W2355228852","https://openalex.org/W2368634462","https://openalex.org/W2361907261","https://openalex.org/W1967933658","https://openalex.org/W2390942931","https://openalex.org/W2136223193","https://openalex.org/W1981680180","https://openalex.org/W2048562664","https://openalex.org/W2153576358","https://openalex.org/W2381636813"],"abstract_inverted_index":{"Certificateless":[0],"signature":[1,11,36,40,52,68],"eliminates":[2],"the":[3,14,45,54,72,76,103],"need":[4],"of":[5,56,87],"certificates":[6],"in":[7,19,34,75],"traditional":[8],"public":[9],"key":[10,16,31,58],"and":[12,70],"solves":[13],"inherent":[15],"escrow":[17,32],"problem":[18,33],"identity-based":[20],"signature.":[21],"Therefore,":[22],"it":[23],"is":[24,100],"an":[25],"important":[26],"secure":[27],"requirement":[28],"to":[29,43,102],"solve":[30],"certificateless":[35,39,66],"scheme,":[37,69],"i.e.,":[38],"scheme":[41,99],"should":[42],"resist":[44],"malicious":[46],"but":[47],"passive":[48],"KGC":[49,105],"attack.":[50,106],"Key-insulated":[51],"reduces":[53],"endangerment":[55],"private":[57],"leakage.":[59],"Recently,":[60],"Chen":[61,88,96],"et":[62,89,97],"al.":[63],"propose":[64],"a":[65,84],"key-insulated":[67],"give":[71,83],"security":[73,85],"proof":[74],"standard":[77],"model.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"analysis":[86,93],"al.'s":[90,98],"scheme.":[91],"Our":[92],"reveals":[94],"that":[95],"vulnerable":[101],"malicious-but-passive":[104]},"counts_by_year":[{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
