{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:23:45Z","timestamp":1770225825683,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377655","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"6-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secret Sharing Based BLMQ Signature Generation"],"prefix":"10.1145","author":[{"given":"Yihong","family":"Long","sequence":"first","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, China"}]},{"given":"Feng","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Reconfigurable Security: Edge-Computing-Based Framework for IoT","author":"Hsu R.H.","year":"2018","unstructured":"Hsu , R.H. , Lee , J. , Quek , T.Q.S. , 2018 . Reconfigurable Security: Edge-Computing-Based Framework for IoT . IEEE Network , 32, 5(September-October 2018), 92--99. Hsu, R.H., Lee, J., Quek, T.Q.S., et al. 2018. Reconfigurable Security: Edge-Computing-Based Framework for IoT. IEEE Network, 32, 5(September-October 2018), 92--99."},{"key":"e_1_3_2_1_2_1","article-title":"Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges","volume":"2013","author":"Rehman S.U.","year":"2013","unstructured":"Rehman , S.U. , Khan , M.A. , Zia , T.A. , and Zheng , L. 2013 . Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges . Journal of Wireless Networking and Communications 2013 , 3,3, 29--38. Rehman, S.U., Khan, M.A., Zia, T.A., and Zheng, L. 2013. Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges. Journal of Wireless Networking and Communications 2013, 3,3, 29--38.","journal-title":"Journal of Wireless Networking and Communications"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700120"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2764330"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2017.8244094"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2043038"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2015.7440434"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WISNET.2015.7127417"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728284"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Chan J. H. Hong J. L. 2016. Mobile security and its application. International Journal of Security and its Applications 10 10(2016) 89--106.  Chan J. H. Hong J. L. 2016. Mobile security and its application. International Journal of Security and its Applications 10 10(2016) 89--106.","DOI":"10.14257\/ijsia.2016.10.10.10"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. 2nd Conf. on Mobile and Secure Services","author":"Wang Y.","year":"2016","unstructured":"Wang , Y. , Hahn , C. , and Sutrave , K . 2016. Mobile Payment Security, Threats, and Challenges . Proc. 2nd Conf. on Mobile and Secure Services ( Gainesville, FL, United States , 26-27 February , 2016 ). Wang, Y., Hahn, C., and Sutrave, K. 2016. Mobile Payment Security, Threats, and Challenges. Proc. 2nd Conf. on Mobile and Secure Services(Gainesville, FL, United States, 26-27 February, 2016)."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. Int. Conf. on Computational Intelligence and Security(2010)","author":"Li Y.X.","unstructured":"Li , Y.X. , Qin , L. , and Liang , Q . 2010. Research on Wireless Sensor Network Security . Proc. Int. Conf. on Computational Intelligence and Security(2010) , 493--496. Li, Y.X., Qin, L., and Liang, Q. 2010. Research on Wireless Sensor Network Security. Proc. Int. Conf. on Computational Intelligence and Security(2010), 493--496."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. 15th Int. Conf. on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering(Nusa Dua","author":"Putra D.S.K.","year":"2017","unstructured":"Putra , D.S.K. , Sadikin , M.A. , and Windarta , S . 2017. S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smart Card . Proc. 15th Int. Conf. on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering(Nusa Dua , Bali, Indonesia , 24-27 July 2017 ), 230--234. Putra, D.S.K., Sadikin, M.A., and Windarta, S. 2017. S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smart Card. Proc. 15th Int. Conf. on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering(Nusa Dua, Bali, Indonesia, 24-27 July 2017), 230--234."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. 10th Asia Joint Conf. on Information Security","author":"Huang J. J.","year":"2015","unstructured":"Huang , J. J. , Juang , W. S. , and Fan , C. I . 2015. A secure and efficient smartphone payment scheme in IoT\/Cloud environments . Proc. 10th Asia Joint Conf. on Information Security ( Kaohsiung City, Taiwan , May 2015 ), 91--96. Huang, J. J., Juang, W. S., and Fan, C. I. 2015. A secure and efficient smartphone payment scheme in IoT\/Cloud environments. Proc. 10th Asia Joint Conf. on Information Security(Kaohsiung City, Taiwan, May 2015), 91--96."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCCT.2015.7342725"},{"key":"e_1_3_2_1_17_1","volume-title":"A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things","author":"Mughal M.A.","year":"2018","unstructured":"Mughal , M.A. , Luo , X. , Ullah , A. , A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things . IEEE Access , 6( June 6, 2018 ), 31630--31643. Mughal, M.A., Luo, X., Ullah, A., et al. 2018. A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things. IEEE Access, 6(June 6, 2018), 31630--31643."},{"key":"e_1_3_2_1_18_1","volume-title":"On Security of Wireless Sensor Networks: A Data Authentication Protocol Using Digital Signature. Wireless Networks, 23, 4(May 1","author":"Ferng H.W.","year":"2017","unstructured":"Ferng , H.W. , Khoa , N.M. 2017. On Security of Wireless Sensor Networks: A Data Authentication Protocol Using Digital Signature. Wireless Networks, 23, 4(May 1 , 2017 ), 1113--1131. Ferng, H.W., Khoa, N.M. 2017. On Security of Wireless Sensor Networks: A Data Authentication Protocol Using Digital Signature. Wireless Networks, 23, 4(May 1, 2017), 1113--1131."},{"key":"e_1_3_2_1_19_1","volume-title":"LNCS 196","author":"Shamir A.","year":"1985","unstructured":"Shamir , A. 1985. Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology - Proc. Crypto 84 , LNCS 196 , Springer-Verlag , 1985 , 47--53. Shamir, A. 1985. Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology - Proc. Crypto 84, LNCS 196, Springer-Verlag, 1985, 47--53."},{"key":"e_1_3_2_1_20_1","volume-title":"Identity based encryption from the Weil pairing. Advances in Cryptology - Proc. Crypto","author":"Boneh D.","year":"2001","unstructured":"Boneh , D. , Franklin , M. 2001. Identity based encryption from the Weil pairing. Advances in Cryptology - Proc. Crypto 2001 , LNCS 2139, Springer-Verlag , 2001, 213--229. Boneh, D., Franklin, M. 2001. Identity based encryption from the Weil pairing. Advances in Cryptology - Proc. Crypto 2001, LNCS 2139, Springer-Verlag, 2001, 213--229."},{"key":"e_1_3_2_1_21_1","volume-title":"An Identity-based Encryption Scheme Based on Quadratic Residues. Cryptography and Coding - Proc. 8th IMA International Conference, LNCS 2260","author":"Cocks C.","year":"2001","unstructured":"Cocks , C. 2001 . An Identity-based Encryption Scheme Based on Quadratic Residues. Cryptography and Coding - Proc. 8th IMA International Conference, LNCS 2260 , Springer-Verlag , 2001, 360--363. Cocks, C. 2001. An Identity-based Encryption Scheme Based on Quadratic Residues. Cryptography and Coding - Proc. 8th IMA International Conference, LNCS 2260, Springer-Verlag, 2001, 360--363."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. Symposium on Cryptography and Information Security(January","author":"Sakai R.","year":"2000","unstructured":"Sakai , R. , Ohgishi , K. , and Kasahara , M . 2000.Cryptosystems based on pairing . Proc. Symposium on Cryptography and Information Security(January , 2000 ), 26--28. Sakai, R., Ohgishi, K., and Kasahara, M.2000.Cryptosystems based on pairing. Proc. Symposium on Cryptography and Information Security(January, 2000), 26--28."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2017.8275115"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8242008"},{"key":"e_1_3_2_1_26_1","volume-title":"Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures. Proc. 51st Annual Convention of the Computer Society of India","author":"Suganthi S.D.","year":"2016","unstructured":"Suganthi , S.D. , Anitha , R. , and Thanalakshmi , P . 2016 . Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures. Proc. 51st Annual Convention of the Computer Society of India ( Coimbatore, India , 8-9 December 2016 ), 155--168. Suganthi, S.D., Anitha, R., and Thanalakshmi, P. 2016. Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures. Proc. 51st Annual Convention of the Computer Society of India(Coimbatore, India, 8-9 December 2016), 155--168."},{"key":"e_1_3_2_1_27_1","volume-title":"IEEE Standard for Identity-Based Cryptographic Techniques using Pairings. Microprocessor Standards Committee of the IEEE Computer Society(22","author":"Std","year":"2013","unstructured":"IEEE Std 1363.3-2013. 2013. IEEE Standard for Identity-Based Cryptographic Techniques using Pairings. Microprocessor Standards Committee of the IEEE Computer Society(22 August 2013 ). IEEE Std 1363.3-2013. 2013. IEEE Standard for Identity-Based Cryptographic Techniques using Pairings. Microprocessor Standards Committee of the IEEE Computer Society(22 August 2013)."},{"key":"e_1_3_2_1_28_1","volume-title":"A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wireless Personal Communications, 97, 3(December 1","author":"Harn L.","year":"2017","unstructured":"Harn , L. , Hsu , C. F. 2017. A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wireless Personal Communications, 97, 3(December 1 , 2017 ), 3943--3950. Harn, L., Hsu, C. F. 2017. A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wireless Personal Communications, 97, 3(December 1, 2017), 3943--3950."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Watanabe Y. Shikata J. 2018.Timed-release Computational Secret Sharing and Threshold Encryption. Designs Codes and Cryptography 86 1(January 1 2018) 17--54.  Watanabe Y. Shikata J. 2018.Timed-release Computational Secret Sharing and Threshold Encryption. Designs Codes and Cryptography 86 1(January 1 2018) 17--54.","DOI":"10.1007\/s10623-016-0324-2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2741-3_10"},{"key":"e_1_3_2_1_31_1","volume-title":"Internat. Conf. Inf. Tech. Coding Comput. ITCC, 1","author":"Baek J.","year":"2004","unstructured":"Baek , J. , Zheng , Y. 2004 . Identity-based threshold signature scheme from the bilinear pairings(extended abstract) . Internat. Conf. Inf. Tech. Coding Comput. ITCC, 1 , ( Las Vegas, NV, United states , April 5, 2004), 124--128. Baek, J., Zheng, Y. 2004. Identity-based threshold signature scheme from the bilinear pairings(extended abstract). Internat. Conf. Inf. Tech. Coding Comput. ITCC, 1, ( Las Vegas, NV, United states, April 5, 2004), 124--128."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083996"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_28"}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","location":"Nanjing China","acronym":"ICCSP 2020","sponsor":["NJU Nanjing University"]},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":33,"alternative-id":["10.1145\/3377644.3377655","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377655","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}