{"id":"https://openalex.org/W1999205045","doi":"https://doi.org/10.1109/trustcom.2013.211","title":"Server-Aided Verification Proxy Re-signature","display_name":"Server-Aided Verification Proxy Re-signature","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1999205045","doi":"https://doi.org/10.1109/trustcom.2013.211","mag":"1999205045"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449952","display_name":"Zhiwei Wang","orcid":"https://orcid.org/0000-0002-1612-8573"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"funder","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Wang","raw_affiliation_strings":["[Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China]"],"affiliations":[{"raw_affiliation_string":"[Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China]","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063641145","display_name":"Wei Lv","orcid":"https://orcid.org/0000-0003-0567-8665"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"funder","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lv","raw_affiliation_strings":["[Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China]"],"affiliations":[{"raw_affiliation_string":"[Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China]","institution_ids":["https://openalex.org/I41198531"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.446448,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"1704","last_page":"1707"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9881,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.6444255},{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.57073885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81719995},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.6444255},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.57073885},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.55765265},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4318661},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.42399922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.316433},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21249124},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.07793933},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1508772548","https://openalex.org/W1582711128","https://openalex.org/W1590823599","https://openalex.org/W2051130096","https://openalex.org/W2078194183","https://openalex.org/W2133740767","https://openalex.org/W2159845428","https://openalex.org/W2312441109","https://openalex.org/W3030707664"],"related_works":["https://openalex.org/W2394327612","https://openalex.org/W2383181683","https://openalex.org/W2381394318","https://openalex.org/W2373312497","https://openalex.org/W2367372762","https://openalex.org/W2364484191","https://openalex.org/W2361208059","https://openalex.org/W2361091358","https://openalex.org/W2348267824","https://openalex.org/W1984314719"],"abstract_inverted_index":{"Proxy":[0,33],"re-signature":[1,34,103,109,127,160,169],"is":[2,35,138,143],"proposed":[3],"by":[4,132],"Blaze,":[5],"Blemmer":[6],"and":[7,45,66,111,156],"Strauss":[8],"(BBS),":[9],"in":[10,51],"which":[11,61,104,137],"a":[12,17,20,25,36,70,96,107,112,125],"semi-trusted":[13],"proxy":[14,79,102,108,126,134,159,168],"acts":[15],"as":[16],"translator":[18],"converts":[19],"signature":[21,26,76],"from":[22,27,77],"Alice":[23],"into":[24],"Bob":[28],"on":[29,151],"the":[30,41,46,74,78,90,117,133,152],"same":[31],"message.":[32],"very":[37,144],"useful":[38,145],"tool":[39],"for":[40,124,146],"interoperable":[42],"DRM":[43],"architecture":[44],"proof":[47],"of":[48,99,106,154],"passed":[49],"path":[50],"cloud":[52,55],"computing.":[53],"However,":[54],"users":[56],"usually":[57],"are":[58,62,129],"mobile":[59,71,147],"devices":[60],"constrained":[63],"with":[64],"processing":[65],"power":[67],"limitations.":[68],"When":[69],"user":[72],"obtain":[73],"converted":[75],"(cloud":[80,135],"server),":[81,136],"it":[82,87,142],"still":[83],"can":[84],"not":[85],"verify":[86],"due":[88],"to":[89],"heavy":[91],"computation":[92],"cost.":[93],"We":[94,149],"propose":[95],"new":[97],"definition":[98],"server-aided":[100,113,118,166],"verification":[101,114,119,128,167],"consist":[105],"scheme":[110],"protocol.":[115],"With":[116],"protocol,":[120],"some":[121],"computational":[122],"tasks":[123],"carried":[130],"out":[131],"generally":[139],"untrusted,":[140],"therefore,":[141],"devices.":[148],"present,":[150],"basis":[153],"Ateniese":[155],"Hohenberger's":[157],"unidirectional":[158],"scheme,":[161],"two":[162],"novel":[163],"existential":[164],"unforgeability":[165],"schemes.":[170]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1999205045","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-02-21T12:44:57.737821","created_date":"2016-06-24"}