Provably secure revocable ID‐based signature in the standard model

Article Properties
  • Language
    English
  • DOI (url)
  • Publication Date
    2013/01/18
  • Indian UGC (journal)
  • Refrences
    28
  • Citations
    23
  • Tung‐Tso Tsai Department of Mathematics National Changhua University of Education Jin‐De Campus Chang‐Hua City 500 Taiwan
  • Yuh‐Min Tseng Department of Mathematics National Changhua University of Education Jin‐De Campus Chang‐Hua City 500 Taiwan
  • Tsu‐Yang Wu School of Computer Science and Technology Shenzhen Graduate School, Harbin Institute of Technology Shenzhen 518055 China
Abstract
Cite
Tsai, Tung‐Tso, et al. “Provably Secure Revocable ID‐based Signature in the Standard Model”. Security and Communication Networks, vol. 6, no. 10, 2013, pp. 1250-6, https://doi.org/10.1002/sec.696.
Tsai, T., Tseng, Y., & Wu, T. (2013). Provably secure revocable ID‐based signature in the standard model. Security and Communication Networks, 6(10), 1250-1260. https://doi.org/10.1002/sec.696
Tsai T, Tseng Y, Wu T. Provably secure revocable ID‐based signature in the standard model. Security and Communication Networks. 2013;6(10):1250-6.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Telecommunication
Technology
Technology (General)
Industrial engineering
Management engineering
Information technology
Refrences
Title Journal Journal Categories Citations Publication Date
Towards ID‐based authenticated group key exchange protocol with identifying malicious participants 2012
A pairing‐based user authentication scheme for wireless clients with smart cards 2008
A secure ID‐based authenticated group key exchange protocol resistant to insider attacks 2011
10.1007/3-540-39568-7_5
10.1007/11780656_18
Citations
Title Journal Journal Categories Citations Publication Date
Lattice‐based batch authentication scheme with dynamic identity revocation in VANET International Journal of Intelligent Systems
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Mechanical engineering and machinery
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Engineering (General). Civil engineering (General)
2 2022
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance Information Sciences
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
5 2022
Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home Journal of King Saud University - Computer and Information Sciences
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2 2022
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing IEEE Transactions on Big Data 2022
Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations

Security and Communication Networks
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2022
Citations Analysis
The category Science: Science (General): Cybernetics: Information theory 12 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants and was published in 2014. The most recent citation comes from a 2022 study titled Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations. This article reached its peak citation in 2016, with 6 citations. It has been cited in 16 different journals, 25% of which are open access. Among related journals, the Security and Communication Networks cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year