{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:52:47Z","timestamp":1742968367922,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031192074"},{"type":"electronic","value":"9783031192081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19208-1_39","type":"book-chapter","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:03:45Z","timestamp":1668643425000},"page":"479-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CA-Free Real-Time Fuzzy Digital Signature Scheme"],"prefix":"10.1007","author":[{"given":"Yijie","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9076-1695","authenticated-orcid":false,"given":"Shiyuan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","unstructured":"Arroyo, D., Diaz, J., Rodriguez, F. B.: Non-conventional digital signatures and their implementations\u2014a review. In: Computational Intelligence in Security for Information Systems Conference, pp. 425\u2013435. Springer, Cham, Switzerland (2015). https:\/\/doi.org\/10.1007\/978-3-319-19713-5_36","DOI":"10.1007\/978-3-319-19713-5_36"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Bakshi, P., Subramanian, N., Nandi, S.: Using digital tokens to improve amortized performance of eSign. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 121\u2013128. IEEE, Athens, Greece (2018)","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00033"},{"key":"39_CR3","unstructured":"Saadatm, An, J., Rahimi, A.: Digital certificate of public key for user authentication and session key establishment for secure network communications. Int. J. Netw. Security 23(3), 480\u2013489 (2021)"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-030-86130-8_6","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Xu","year":"2021","unstructured":"Xu, S., Chen, X., Wang, C., He, Y., Xiao, K., Cao, Y.: A lattice-based ring signature scheme to secure automated valet parking. In: Liu, Z., Wu, F., Das, S.K. (eds.) Wireless Algorithms, Systems, and Applications. Lecture Notes in Computer Science, vol. 12938, pp. 70\u201383. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86130-8_6"},{"key":"39_CR5","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2009","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2009)"},{"issue":"5","key":"39_CR6","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s10207-019-00428-z","volume":"18","author":"K Takahashi","year":"2019","unstructured":"Takahashi, K., Matsuda, T., Murakami, T., Hanaoka, G., Nishigaki, M.: Signature schemes with a fuzzy private key. Int. J. Inf. Secur. 18(5), 581\u2013617 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00428-z","journal-title":"Int. J. Inf. Secur."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., Jain, A. K.: FVC2002: Second fingerprint verification competition. In: Object recognition supported by user interaction for service robots, pp. 811\u2013814. IEEE, Quebec City, Canada (2002)","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"39_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 147\u2013163. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_9"},{"issue":"2","key":"39_CR9","first-page":"203","volume":"46","author":"D Boneh","year":"1999","unstructured":"Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the AMS 46(2), 203\u2013213 (1999)","journal-title":"Notices of the AMS"},{"issue":"3","key":"39_CR10","first-page":"7","volume":"68","author":"AA Khan","year":"2013","unstructured":"Khan, A.A.: Preventing phishing attacks using one time password and user machine identification. Int. J. Comput. Appl. 68(3), 7\u201311 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_31"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Singh, B.K.: Cryptographic key generation from cancelable fingerprint templates. In: 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1\u20136. IEEE, Dhanbad, India (2018)","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Terh\u00f6rst, P., F\u00e4hrmann, D., Damer, N., Kirchbuchner, F., Kuijper, A.: Beyond identity: What information is stored in biometric face templates? In: 2020 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u201310. IEEE, Houston, TX (2020)","DOI":"10.1109\/IJCB48548.2020.9304874"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Xu, S., Chen, X., He, Y.: EVchain: an anonymous blockchain-based system for Charg-ing-Connected electric vehicles. Tsinghua Sci. Technol. 26(6), 845\u2013856 (2021)","DOI":"10.26599\/TST.2020.9010043"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, S., Chen, X., He, Y., Jiang, S.: A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput. Netw.\u00a0124\u00a0(2022)","DOI":"10.1016\/j.comnet.2022.109149"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Xu, S., Zang, M., Jiang, S., Zhang, Y.: Secure Authentication Scheme for VANET Based on Blockchain. In: Proceedings of ICCC, pp. 1526\u20131531 (2021)","DOI":"10.1109\/ICCC54389.2021.9674693"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Xu, S., Zang, M., Kong, W.: LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones. In: Proceedings of ICCT, pp. 656\u2013661 (2021)","DOI":"10.1109\/ICCT52962.2021.9658014"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Chen, X., Xu, S., Qin, T., Cui, Y., Gao, S., Kong, W.: AQ-ABS: Anti-Quantum Attribute-based Signature for EMRs Sharing with Blockchain. In: Proceedings of WCNC, pp. 1176\u20131181 (2022)","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Chen, X., Xu, S., He, Y., Cui, Y., He, J., Gao, S.: LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios. In: Proceedings of ICC, early access (2022)","DOI":"10.1109\/ICC45855.2022.9838582"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19208-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T20:09:36Z","timestamp":1728418176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19208-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031192074","9783031192081"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19208-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"265","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}