{"id":"https://openalex.org/W1996345029","doi":"https://doi.org/10.1109/incos.2013.94","title":"Leakage-Resilient Proxy Signatures","display_name":"Leakage-Resilient Proxy Signatures","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W1996345029","doi":"https://doi.org/10.1109/incos.2013.94","mag":"1996345029"},"language":"en","primary_location":{"id":"doi:10.1109/incos.2013.94","is_oa":false,"landing_page_url":"https://doi.org/10.1109/incos.2013.94","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101921140","display_name":"Fei Tang","orcid":"https://orcid.org/0000-0002-0048-9876"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Tang","raw_affiliation_strings":["State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003431","display_name":"Hongda Li","orcid":"https://orcid.org/0000-0001-5589-4759"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongda Li","raw_affiliation_strings":["State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061074885","display_name":"Qihua Niu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qihua Niu","raw_affiliation_strings":["State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054747769","display_name":"Bei Liang","orcid":"https://orcid.org/0000-0002-8622-8596"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bei Liang","raw_affiliation_strings":["State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101921140"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.4809,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74734329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"e79 a","issue":null,"first_page":"495","last_page":"502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.7688340544700623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6491580009460449},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5968795418739319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5906157493591309},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5841562747955322},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5776717066764832},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5733867883682251},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5202121138572693}],"concepts":[{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.7688340544700623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6491580009460449},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5968795418739319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5906157493591309},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5841562747955322},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5776717066764832},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5733867883682251},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5202121138572693},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/incos.2013.94","is_oa":false,"landing_page_url":"https://doi.org/10.1109/incos.2013.94","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W28380714","https://openalex.org/W63556352","https://openalex.org/W151022734","https://openalex.org/W236432643","https://openalex.org/W1481068248","https://openalex.org/W1483290420","https://openalex.org/W1492137673","https://openalex.org/W1507441866","https://openalex.org/W1517408157","https://openalex.org/W1524293366","https://openalex.org/W1547517307","https://openalex.org/W1550744555","https://openalex.org/W1572559454","https://openalex.org/W1573157032","https://openalex.org/W1587376951","https://openalex.org/W1588518948","https://openalex.org/W1788452017","https://openalex.org/W1829732909","https://openalex.org/W1852820576","https://openalex.org/W1970187925","https://openalex.org/W1976385711","https://openalex.org/W1987129710","https://openalex.org/W2012454489","https://openalex.org/W2107691219","https://openalex.org/W2117459578","https://openalex.org/W2123073224","https://openalex.org/W2138177838","https://openalex.org/W2147832797","https://openalex.org/W2154909745","https://openalex.org/W2167179301","https://openalex.org/W2169985476","https://openalex.org/W2913844835","https://openalex.org/W3031770538","https://openalex.org/W4285719527","https://openalex.org/W6602561615","https://openalex.org/W6609136872","https://openalex.org/W6628662567","https://openalex.org/W6628965688","https://openalex.org/W6629193457","https://openalex.org/W6630372248","https://openalex.org/W6630892630","https://openalex.org/W6632770775","https://openalex.org/W6633111061","https://openalex.org/W6634172598","https://openalex.org/W6634473111","https://openalex.org/W6635454352","https://openalex.org/W6638436873","https://openalex.org/W6638519753","https://openalex.org/W6677127160","https://openalex.org/W6681825675","https://openalex.org/W6684928912","https://openalex.org/W6758767585"],"related_works":["https://openalex.org/W189451467","https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2769734684","https://openalex.org/W2969678054","https://openalex.org/W1796231437","https://openalex.org/W2352435628"],"abstract_inverted_index":{"We":[0],"design":[1],"a":[2,43,96],"proxy":[3,20,38,71,79],"signature":[4],"in":[5,25,32,42],"the":[6,12,19,28,37,70,78,90,102],"setting":[7],"of":[8,51,77],"leakage-resilient":[9,91],"cryptography":[10],"for":[11],"first":[13],"time.":[14],"Our":[15],"motivation":[16],"is":[17,30,40,46],"that":[18],"signatures":[21,80],"are":[22],"often":[23],"used":[24],"scenarios":[26],"where":[27],"signing":[29],"done":[31],"an":[33,57],"insecure":[34],"environment,":[35],"e.g.,":[36],"key":[39],"stored":[41],"device":[44],"which":[45,99],"not":[47],"secure":[48],"enough":[49],"example":[50],"IC":[52],"card.":[53],"In":[54],"such":[55,83],"setting,":[56,92],"adversary":[58],"who":[59],"can":[60],"launch":[61],"side-channel":[62],"attacks":[63],"may":[64],"detect":[65],"some":[66],"leakage":[67],"information":[68],"about":[69],"key.":[72],"The":[73],"traditional":[74],"security":[75,104],"models":[76],"cannot":[81],"provide":[82],"security.":[84],"Hence":[85],"we":[86],"extend":[87],"them":[88],"to":[89,101],"and":[93],"also":[94],"give":[95],"concrete":[97],"construction":[98],"conforms":[100],"extended":[103],"model.":[105]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
