Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1109/access.2024.3355196
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated verifier signature schemes. In the proposed scheme, the signer encrypts a message with his or her private key, and the designated verifier validates the accompanying QDVS using the signer’s public key, which is the signer’s name or email address, which makes the quantum signature system’s key management simpler. It uses an entangled state while signing and verifying the signature; however, the verifier is not required to compare quantum states. A detailed comparison analysis with other similar schemes provides more security for the proposed scheme. Furthermore, the proposed scheme’s effectiveness and feasibility are validated using quantum simulations.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2024.3355196
- https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdf
- OA Status
- gold
- Cited By
- 25
- References
- 51
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4390939284
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4390939284Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2024.3355196Digital Object Identifier
- Title
-
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong SecurityWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-01-01Full publication date if available
- Authors
-
Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim HossainList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2024.3355196Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdfDirect OA link when available
- Concepts
-
Computer science, Computer security, Quantum cryptography, Eavesdropping, Public-key cryptography, Quantum key distribution, Digital signature, Security analysis, Cryptography, Theoretical computer science, Quantum, Quantum information, Encryption, Hash function, Physics, Quantum mechanicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
25Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 11, 2024: 14Per-year citation counts (last 5 years)
- References (count)
-
51Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4390939284 |
|---|---|
| doi | https://doi.org/10.1109/access.2024.3355196 |
| ids.doi | https://doi.org/10.1109/access.2024.3355196 |
| ids.openalex | https://openalex.org/W4390939284 |
| fwci | 15.96946373 |
| type | article |
| title | Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security |
| biblio.issue | |
| biblio.volume | 12 |
| biblio.last_page | 14658 |
| biblio.first_page | 14647 |
| topics[0].id | https://openalex.org/T10020 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Quantum Information and Cryptography |
| topics[1].id | https://openalex.org/T10682 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998000264167786 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Quantum Computing Algorithms and Architecture |
| topics[2].id | https://openalex.org/T10622 |
| topics[2].field.id | https://openalex.org/fields/31 |
| topics[2].field.display_name | Physics and Astronomy |
| topics[2].score | 0.9988999962806702 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3107 |
| topics[2].subfield.display_name | Atomic and Molecular Physics, and Optics |
| topics[2].display_name | Quantum Mechanics and Applications |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7549746036529541 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6155979633331299 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C144901912 |
| concepts[2].level | 4 |
| concepts[2].score | 0.6002340912818909 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q471906 |
| concepts[2].display_name | Quantum cryptography |
| concepts[3].id | https://openalex.org/C2776788033 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5533447861671448 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q320769 |
| concepts[3].display_name | Eavesdropping |
| concepts[4].id | https://openalex.org/C203062551 |
| concepts[4].level | 3 |
| concepts[4].score | 0.49079760909080505 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[4].display_name | Public-key cryptography |
| concepts[5].id | https://openalex.org/C95466800 |
| concepts[5].level | 3 |
| concepts[5].score | 0.49072182178497314 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1027298 |
| concepts[5].display_name | Quantum key distribution |
| concepts[6].id | https://openalex.org/C118463975 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4645611345767975 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q220849 |
| concepts[6].display_name | Digital signature |
| concepts[7].id | https://openalex.org/C38369872 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4312344789505005 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7445009 |
| concepts[7].display_name | Security analysis |
| concepts[8].id | https://openalex.org/C178489894 |
| concepts[8].level | 2 |
| concepts[8].score | 0.42594215273857117 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[8].display_name | Cryptography |
| concepts[9].id | https://openalex.org/C80444323 |
| concepts[9].level | 1 |
| concepts[9].score | 0.36045652627944946 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[9].display_name | Theoretical computer science |
| concepts[10].id | https://openalex.org/C84114770 |
| concepts[10].level | 2 |
| concepts[10].score | 0.3148089349269867 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q46344 |
| concepts[10].display_name | Quantum |
| concepts[11].id | https://openalex.org/C169699857 |
| concepts[11].level | 3 |
| concepts[11].score | 0.22052928805351257 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2122243 |
| concepts[11].display_name | Quantum information |
| concepts[12].id | https://openalex.org/C148730421 |
| concepts[12].level | 2 |
| concepts[12].score | 0.11319327354431152 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[12].display_name | Encryption |
| concepts[13].id | https://openalex.org/C99138194 |
| concepts[13].level | 2 |
| concepts[13].score | 0.1110156774520874 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[13].display_name | Hash function |
| concepts[14].id | https://openalex.org/C121332964 |
| concepts[14].level | 0 |
| concepts[14].score | 0.08197039365768433 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[14].display_name | Physics |
| concepts[15].id | https://openalex.org/C62520636 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[15].display_name | Quantum mechanics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7549746036529541 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.6155979633331299 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/quantum-cryptography |
| keywords[2].score | 0.6002340912818909 |
| keywords[2].display_name | Quantum cryptography |
| keywords[3].id | https://openalex.org/keywords/eavesdropping |
| keywords[3].score | 0.5533447861671448 |
| keywords[3].display_name | Eavesdropping |
| keywords[4].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[4].score | 0.49079760909080505 |
| keywords[4].display_name | Public-key cryptography |
| keywords[5].id | https://openalex.org/keywords/quantum-key-distribution |
| keywords[5].score | 0.49072182178497314 |
| keywords[5].display_name | Quantum key distribution |
| keywords[6].id | https://openalex.org/keywords/digital-signature |
| keywords[6].score | 0.4645611345767975 |
| keywords[6].display_name | Digital signature |
| keywords[7].id | https://openalex.org/keywords/security-analysis |
| keywords[7].score | 0.4312344789505005 |
| keywords[7].display_name | Security analysis |
| keywords[8].id | https://openalex.org/keywords/cryptography |
| keywords[8].score | 0.42594215273857117 |
| keywords[8].display_name | Cryptography |
| keywords[9].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[9].score | 0.36045652627944946 |
| keywords[9].display_name | Theoretical computer science |
| keywords[10].id | https://openalex.org/keywords/quantum |
| keywords[10].score | 0.3148089349269867 |
| keywords[10].display_name | Quantum |
| keywords[11].id | https://openalex.org/keywords/quantum-information |
| keywords[11].score | 0.22052928805351257 |
| keywords[11].display_name | Quantum information |
| keywords[12].id | https://openalex.org/keywords/encryption |
| keywords[12].score | 0.11319327354431152 |
| keywords[12].display_name | Encryption |
| keywords[13].id | https://openalex.org/keywords/hash-function |
| keywords[13].score | 0.1110156774520874 |
| keywords[13].display_name | Hash function |
| keywords[14].id | https://openalex.org/keywords/physics |
| keywords[14].score | 0.08197039365768433 |
| keywords[14].display_name | Physics |
| language | en |
| locations[0].id | doi:10.1109/access.2024.3355196 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2024.3355196 |
| locations[1].id | pmh:oai:digitalcommons.odu.edu:vmasc_pubs-1101 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4377196314 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | ODU Digital Commons (Old Dominion University) |
| locations[1].source.host_organization | https://openalex.org/I81365321 |
| locations[1].source.host_organization_name | Old Dominion University |
| locations[1].source.host_organization_lineage | https://openalex.org/I81365321 |
| locations[1].license | cc-by-nc-nd |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | VMASC Publications |
| locations[1].landing_page_url | https://digitalcommons.odu.edu/vmasc_pubs/100 |
| locations[2].id | pmh:oai:doaj.org/article:f08f6eb43eb445c3a2bda4361d1523d3 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | IEEE Access, Vol 12, Pp 14647-14658 (2024) |
| locations[2].landing_page_url | https://doaj.org/article/f08f6eb43eb445c3a2bda4361d1523d3 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5087763096 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9343-5182 |
| authorships[0].author.display_name | Sunil Prajapat |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I180952551 |
| authorships[0].affiliations[0].raw_affiliation_string | Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[0].institutions[0].id | https://openalex.org/I180952551 |
| authorships[0].institutions[0].ror | https://ror.org/04v5nzb91 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I180952551 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Central University of Himachal Pradesh |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sunil Prajapat |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[1].author.id | https://openalex.org/A5100747929 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-4589-3573 |
| authorships[1].author.display_name | Pankaj Kumar |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I180952551 |
| authorships[1].affiliations[0].raw_affiliation_string | Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[1].institutions[0].id | https://openalex.org/I180952551 |
| authorships[1].institutions[0].ror | https://ror.org/04v5nzb91 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I180952551 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Central University of Himachal Pradesh |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Pankaj Kumar |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[2].author.id | https://openalex.org/A5103964437 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Sandeep Kumar |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I180952551 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Physics and Astronomical Science, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[2].institutions[0].id | https://openalex.org/I180952551 |
| authorships[2].institutions[0].ror | https://ror.org/04v5nzb91 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I180952551 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Central University of Himachal Pradesh |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Sandeep Kumar |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Physics and Astronomical Science, Central University of Himachal Pradesh, Dharamshala, India |
| authorships[3].author.id | https://openalex.org/A5011213078 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-5196-9589 |
| authorships[3].author.display_name | Ashok Kumar Das |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I64189192 |
| authorships[3].affiliations[0].raw_affiliation_string | Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India |
| authorships[3].institutions[0].id | https://openalex.org/I64189192 |
| authorships[3].institutions[0].ror | https://ror.org/05f11g639 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I64189192 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | International Institute of Information Technology, Hyderabad |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Ashok Kumar Das |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India |
| authorships[4].author.id | https://openalex.org/A5052787847 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-8789-0610 |
| authorships[4].author.display_name | Sachin Shetty |
| authorships[4].countries | US |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I81365321 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computational Modeling and Simulation Engineering, Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Suffolk, VA, USA |
| authorships[4].institutions[0].id | https://openalex.org/I81365321 |
| authorships[4].institutions[0].ror | https://ror.org/04zjtrb98 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I81365321 |
| authorships[4].institutions[0].country_code | US |
| authorships[4].institutions[0].display_name | Old Dominion University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Sachin Shetty |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computational Modeling and Simulation Engineering, Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Suffolk, VA, USA |
| authorships[5].author.id | https://openalex.org/A5037865550 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-5906-9422 |
| authorships[5].author.display_name | M. Shamim Hossain |
| authorships[5].countries | SA |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I28022161 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia |
| authorships[5].institutions[0].id | https://openalex.org/I28022161 |
| authorships[5].institutions[0].ror | https://ror.org/02f81g417 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I28022161 |
| authorships[5].institutions[0].country_code | SA |
| authorships[5].institutions[0].display_name | King Saud University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | M. Shamim Hossain |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10020 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Quantum Information and Cryptography |
| related_works | https://openalex.org/W2294678756, https://openalex.org/W2314334203, https://openalex.org/W4312132309, https://openalex.org/W1993562880, https://openalex.org/W2916069885, https://openalex.org/W2047969991, https://openalex.org/W4221147165, https://openalex.org/W4240944159, https://openalex.org/W2147369345, https://openalex.org/W4321151520 |
| cited_by_count | 25 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 11 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 14 |
| locations_count | 3 |
| best_oa_location.id | doi:10.1109/access.2024.3355196 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2024.3355196 |
| primary_location.id | doi:10.1109/access.2024.3355196 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/10401874.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2024.3355196 |
| publication_date | 2024-01-01 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2999979130, https://openalex.org/W2112914778, https://openalex.org/W1500682127, https://openalex.org/W1569033204, https://openalex.org/W1991638127, https://openalex.org/W2887413998, https://openalex.org/W2904329524, https://openalex.org/W2883035063, https://openalex.org/W2923075674, https://openalex.org/W2617168453, https://openalex.org/W4297004241, https://openalex.org/W2137147061, https://openalex.org/W1982185914, https://openalex.org/W2794189120, https://openalex.org/W6864789238, https://openalex.org/W3037687232, https://openalex.org/W2019142321, https://openalex.org/W2301808685, https://openalex.org/W2009771390, https://openalex.org/W2003071921, https://openalex.org/W569011726, https://openalex.org/W2947876297, https://openalex.org/W3196368723, https://openalex.org/W1569083856, https://openalex.org/W2773907423, https://openalex.org/W2791289577, https://openalex.org/W3018267814, https://openalex.org/W2789950367, https://openalex.org/W2531399364, https://openalex.org/W2903279068, https://openalex.org/W2558234664, https://openalex.org/W2042664564, https://openalex.org/W4378983674, https://openalex.org/W4315629554, https://openalex.org/W2109394932, https://openalex.org/W4253091679, https://openalex.org/W3037737784, https://openalex.org/W2532218614, https://openalex.org/W3196598991, https://openalex.org/W2138203529, https://openalex.org/W2049471987, https://openalex.org/W4293200252, https://openalex.org/W4213389117, https://openalex.org/W2987080115, https://openalex.org/W6654347880, https://openalex.org/W4289126832, https://openalex.org/W2056012034, https://openalex.org/W2059955912, https://openalex.org/W1603878273, https://openalex.org/W4394662996, https://openalex.org/W2015179126 |
| referenced_works_count | 51 |
| abstract_inverted_index.A | 169 |
| abstract_inverted_index.a | 11, 37, 110 |
| abstract_inverted_index.An | 55 |
| abstract_inverted_index.In | 103 |
| abstract_inverted_index.It | 148 |
| abstract_inverted_index.an | 24, 150 |
| abstract_inverted_index.in | 17, 45, 64 |
| abstract_inverted_index.is | 23, 42, 62, 83, 132, 162 |
| abstract_inverted_index.it | 82 |
| abstract_inverted_index.of | 5, 39, 50 |
| abstract_inverted_index.on | 87 |
| abstract_inverted_index.or | 114, 136 |
| abstract_inverted_index.to | 1, 165 |
| abstract_inverted_index.Due | 0 |
| abstract_inverted_index.Our | 67 |
| abstract_inverted_index.The | 92 |
| abstract_inverted_index.and | 19, 53, 77, 90, 118, 155, 189 |
| abstract_inverted_index.are | 191 |
| abstract_inverted_index.for | 14, 27, 180 |
| abstract_inverted_index.has | 9 |
| abstract_inverted_index.her | 115 |
| abstract_inverted_index.his | 113 |
| abstract_inverted_index.key | 145 |
| abstract_inverted_index.not | 163 |
| abstract_inverted_index.the | 2, 48, 97, 104, 107, 119, 123, 127, 133, 141, 157, 160, 181, 185 |
| abstract_inverted_index.QDVS | 125 |
| abstract_inverted_index.been | 10 |
| abstract_inverted_index.from | 85, 96 |
| abstract_inverted_index.key, | 117, 130 |
| abstract_inverted_index.like | 47, 72 |
| abstract_inverted_index.more | 178 |
| abstract_inverted_index.name | 135 |
| abstract_inverted_index.race | 13 |
| abstract_inverted_index.this | 65 |
| abstract_inverted_index.tool | 26 |
| abstract_inverted_index.uses | 149 |
| abstract_inverted_index.very | 43 |
| abstract_inverted_index.with | 112, 173 |
| abstract_inverted_index.(IoT) | 52 |
| abstract_inverted_index.email | 137 |
| abstract_inverted_index.makes | 140 |
| abstract_inverted_index.other | 174 |
| abstract_inverted_index.rapid | 3 |
| abstract_inverted_index.state | 152 |
| abstract_inverted_index.there | 8 |
| abstract_inverted_index.using | 126, 193 |
| abstract_inverted_index.which | 131, 139 |
| abstract_inverted_index.while | 153 |
| abstract_inverted_index.work. | 66 |
| abstract_inverted_index.(QDVS) | 60 |
| abstract_inverted_index.Things | 51 |
| abstract_inverted_index.during | 31 |
| abstract_inverted_index.hiding | 78 |
| abstract_inverted_index.public | 129 |
| abstract_inverted_index.scheme | 61, 94 |
| abstract_inverted_index.signer | 108 |
| abstract_inverted_index.useful | 44 |
| abstract_inverted_index.Quantum | 21 |
| abstract_inverted_index.attacks | 86 |
| abstract_inverted_index.compare | 166 |
| abstract_inverted_index.furious | 12 |
| abstract_inverted_index.message | 111 |
| abstract_inverted_index.private | 116 |
| abstract_inverted_index.quantum | 6, 15, 32, 40, 142, 167, 194 |
| abstract_inverted_index.scheme, | 106 |
| abstract_inverted_index.scheme. | 183 |
| abstract_inverted_index.schemes | 176 |
| abstract_inverted_index.signing | 154 |
| abstract_inverted_index.similar | 175 |
| abstract_inverted_index.sources | 79 |
| abstract_inverted_index.states. | 168 |
| abstract_inverted_index.variant | 38 |
| abstract_inverted_index.Internet | 49 |
| abstract_inverted_index.academia | 18 |
| abstract_inverted_index.address, | 138 |
| abstract_inverted_index.analysis | 172 |
| abstract_inverted_index.attacks. | 80 |
| abstract_inverted_index.benefits | 95 |
| abstract_inverted_index.detailed | 170 |
| abstract_inverted_index.encrypts | 109 |
| abstract_inverted_index.features | 69 |
| abstract_inverted_index.forgery, | 88 |
| abstract_inverted_index.however, | 159 |
| abstract_inverted_index.proposed | 93, 105, 182, 186 |
| abstract_inverted_index.protocol | 68 |
| abstract_inverted_index.provides | 177 |
| abstract_inverted_index.required | 164 |
| abstract_inverted_index.schemes. | 102 |
| abstract_inverted_index.security | 29, 70, 179 |
| abstract_inverted_index.services | 30 |
| abstract_inverted_index.simpler. | 147 |
| abstract_inverted_index.verifier | 35, 58, 100, 121, 161 |
| abstract_inverted_index.achieving | 28 |
| abstract_inverted_index.auctions. | 54 |
| abstract_inverted_index.entangled | 151 |
| abstract_inverted_index.important | 25 |
| abstract_inverted_index.industry. | 20 |
| abstract_inverted_index.protected | 84 |
| abstract_inverted_index.signature | 59, 101, 143 |
| abstract_inverted_index.suggested | 63 |
| abstract_inverted_index.validated | 192 |
| abstract_inverted_index.validates | 122 |
| abstract_inverted_index.verifying | 156 |
| abstract_inverted_index.Designated | 34 |
| abstract_inverted_index.attributes | 71 |
| abstract_inverted_index.comparison | 171 |
| abstract_inverted_index.computers, | 7 |
| abstract_inverted_index.designated | 75, 99, 120 |
| abstract_inverted_index.management | 146 |
| abstract_inverted_index.scheme’s | 187 |
| abstract_inverted_index.signature, | 36 |
| abstract_inverted_index.signature; | 158 |
| abstract_inverted_index.signer’s | 128, 134 |
| abstract_inverted_index.system’s | 144 |
| abstract_inverted_index.advancement | 4 |
| abstract_inverted_index.feasibility | 190 |
| abstract_inverted_index.traditional | 98 |
| abstract_inverted_index.Furthermore, | 184 |
| abstract_inverted_index.accompanying | 124 |
| abstract_inverted_index.applications | 46 |
| abstract_inverted_index.cryptography | 22 |
| abstract_inverted_index.simulations. | 195 |
| abstract_inverted_index.technologies | 16 |
| abstract_inverted_index.Additionally, | 81 |
| abstract_inverted_index.cryptography, | 41 |
| abstract_inverted_index.effectiveness | 188 |
| abstract_inverted_index.verification, | 76 |
| abstract_inverted_index.communication. | 33 |
| abstract_inverted_index.eavesdropping, | 73 |
| abstract_inverted_index.identity-based | 56 |
| abstract_inverted_index.impersonation. | 91 |
| abstract_inverted_index.inter-resending, | 89 |
| abstract_inverted_index.non-repudiation, | 74 |
| abstract_inverted_index.quantum-designated | 57 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 98 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.98769653 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |