{"id":"https://openalex.org/W4390352357","doi":"https://doi.org/10.1145/3617184.3623448","title":"Research on Application of Identity Authentication Encryption Technology in Blockchain Scene","display_name":"Research on Application of Identity Authentication Encryption Technology in Blockchain Scene","publication_year":2023,"publication_date":"2023-09-22","ids":{"openalex":"https://openalex.org/W4390352357","doi":"https://doi.org/10.1145/3617184.3623448"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3623448","pdf_url":null,"source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091745235","display_name":"Huizhong Liu","orcid":"https://orcid.org/0000-0001-9147-6466"},"institutions":[{"id":"https://openalex.org/I4210147114","display_name":"Hebei Academy of Sciences","ror":"https://ror.org/03xqveg17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huizhong Liu","raw_affiliation_strings":["Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China","institution_ids":["https://openalex.org/I4210147114"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033867164","display_name":"Suli Ge","orcid":"https://orcid.org/0009-0000-7640-056X"},"institutions":[{"id":"https://openalex.org/I4210147114","display_name":"Hebei Academy of Sciences","ror":"https://ror.org/03xqveg17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Suli Ge","raw_affiliation_strings":["Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China","institution_ids":["https://openalex.org/I4210147114"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045961246","display_name":"Gaifang Tan","orcid":"https://orcid.org/0009-0001-0050-4431"},"institutions":[{"id":"https://openalex.org/I4210147114","display_name":"Hebei Academy of Sciences","ror":"https://ror.org/03xqveg17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaifang Tan","raw_affiliation_strings":["Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China","institution_ids":["https://openalex.org/I4210147114"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004545285","display_name":"S. Tang","orcid":"https://orcid.org/0000-0001-9048-0738"},"institutions":[{"id":"https://openalex.org/I4210147114","display_name":"Hebei Academy of Sciences","ror":"https://ror.org/03xqveg17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Tang","raw_affiliation_strings":["Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Mathematics, Hebei Academy of Sciences, China and \rInformation Security Certification Technology Of Hebei Innovation Center, China","institution_ids":["https://openalex.org/I4210147114"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":67},"biblio":{"volume":null,"issue":null,"first_page":"126","last_page":"129"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.79301286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7241502},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.69146234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5593324},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.55056936},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.525978},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5210309},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5115817},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.48737293},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48469475},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.48166978},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.47436747},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.44218716},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.41100237},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35368085},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.07187769}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3623448","pdf_url":null,"source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.62,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":1,"referenced_works":["https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W4387429380","https://openalex.org/W4387191618","https://openalex.org/W4246652009","https://openalex.org/W3149394126","https://openalex.org/W2396533199","https://openalex.org/W2361619969","https://openalex.org/W2188276378","https://openalex.org/W2168926258","https://openalex.org/W1993945719","https://openalex.org/W1976536045"],"abstract_inverted_index":{"With":[0],"the":[1,10,19,30,41,53,92,106],"wide":[2],"application":[3,11],"of":[4,12,35,55,67,94,108],"computer":[5],"network":[6],"and":[7,18,39,70,73,91,102,123,127,134,147],"intelligent":[8],"terminal,":[9],"blockchain":[13,150],"technology":[14],"is":[15,47,100,145],"rapidly":[16],"popularized,":[17],"corresponding":[20],"information":[21,56,109,121],"security":[22,54],"issues":[23],"become":[24],"increasingly":[25],"important.":[26],"This":[27],"paper":[28],"introduces":[29],"data":[31],"encryption":[32,37,81,89,122,132],"standard":[33],"DES":[34],"symmetric":[36],"algorithm,":[38,90],"discusses":[40],"public-key":[42,96,119],"infrastructure":[43],"system":[44],"PKI.":[45],"It":[46],"a":[48],"third-party":[49],"platform":[50],"to":[51,104],"ensure":[52],"during":[57],"transmission,":[58],"mainly":[59],"responsible":[60],"for":[61],"issuing":[62],"certificates":[63],"with":[64,98],"digital":[65],"signature":[66],"CA":[68],"center":[69],"managing":[71],"public":[72],"private-keys":[74],"needed":[75],"in":[76,149],"RSA":[77,87,118,128,143],"algorithm.":[78],"Several":[79],"asymmetric":[80,88],"algorithms":[82],"are":[83,125,137],"studied,":[84],"focusing":[85],"on":[86],"method":[93],"encrypting":[95],"decryption":[97,124,135],"private-key":[99],"designed":[101],"implemented":[103],"solve":[105],"problem":[107],"authenticity":[110],"identification,":[111],"i.e.,":[112],"identity":[113,116],"authentication":[114],"namely":[115],"authentication.":[117],"generation,":[120],"designed,":[126],"key":[129],"generator":[130],"module,":[131],"module":[133,136],"realized.":[138],"The":[139],"results":[140],"show":[141],"that":[142],"algorithm":[144],"feasible":[146],"safe":[148],"scene.":[151]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390352357","counts_by_year":[],"updated_date":"2025-01-17T14:37:57.018499","created_date":"2023-12-29"}