Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

Article Properties
  • Language
    English
  • Publication Date
    2021/03/30
  • Indian UGC (journal)
  • Refrences
    48
  • Citations
    3
  • Jianchang Lai Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province , College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350000, China
  • Xinyi Huang Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province , College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350000, China
  • Debiao He Key Laboratory of Aerospace Information Security and Trusted Computing , Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • Wei Wu Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province , College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350000, China
Abstract
Cite
Lai, Jianchang, et al. “Provably Secure Online Offline Identity-Based Signature Scheme Based on SM9”. The Computer Journal, vol. 65, no. 7, 2021, pp. 1692-01, https://doi.org/10.1093/comjnl/bxab009.
Lai, J., Huang, X., He, D., & Wu, W. (2021). Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. The Computer Journal, 65(7), 1692-1701. https://doi.org/10.1093/comjnl/bxab009
Lai, Jianchang, Xinyi Huang, Debiao He, and Wei Wu. “Provably Secure Online Offline Identity-Based Signature Scheme Based on SM9”. The Computer Journal 65, no. 7 (2021): 1692-1701. https://doi.org/10.1093/comjnl/bxab009.
Lai J, Huang X, He D, Wu W. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. The Computer Journal. 2021;65(7):1692-701.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Refrences
Title Journal Journal Categories Citations Publication Date
Scalable revocable identity-based signature over lattices in the standard model Information Sciences
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
12 2020
RKA security for identity-based signature scheme IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2020
Server-aided immediate and robust user revocation mechanism for SM9

Cybersecurity
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
4 2020
An efficient online/offline ID-based short signature procedure using extended chaotic maps Soft Computing
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Mechanical engineering and machinery
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
28 2019
Identity-Based Broadcast Encryption for Inner Products The Computer Journal
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
11 2018
Citations
Title Journal Journal Categories Citations Publication Date
Fault-tolerant identity-based encryption from SM9 Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
A Zero-trust Access Control Scheme Based on CPABE

Journal of Physics: Conference Series 2023
IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2021
Citations Analysis
The category Science: Science (General): Cybernetics: Information theory 2 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks and was published in 2021. The most recent citation comes from a 2024 study titled Fault-tolerant identity-based encryption from SM9. This article reached its peak citation in 2024, with 1 citations. It has been cited in 3 different journals, 33% of which are open access. Among related journals, the Science China Information Sciences cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year