Efficient and secure multiple digital signature to prevent forgery based on ECC Article Swipe
Sarvesh Tanwar
,
Sumit Badotra
,
Medini Gupta
,
Ajay Rana
·
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.6703/ijase.202109_18(5).010
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.6703/ijase.202109_18(5).010
Adversary can be able to perform selective forgery where valid signature on message are created by someone else, with a significant probability and existential forgery, in which a pair of message and valid signature is created by him. For a signature scheme to be perfectly secured, it should be secured computationally. We present an ID based multiple signatures scheme secure against selective forgery attack based on ECC. The objective of the work carried out is to design and implement multi digital signature based on ECC against selective forgery attack.
Related Topics
Concepts
Digital signature
Computer security
Signature (topology)
Computer science
Ring signature
Adversary
ElGamal signature scheme
Merkle signature scheme
Scheme (mathematics)
Blind signature
Digital Signature Algorithm
Schnorr signature
Mathematics
Hash function
Geometry
Mathematical analysis
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.6703/ijase.202109_18(5).010
- https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdf
- OA Status
- gold
- Cited By
- 20
- References
- 38
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3200988896
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3200988896Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.6703/ijase.202109_18(5).010Digital Object Identifier
- Title
-
Efficient and secure multiple digital signature to prevent forgery based on ECCWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-01Full publication date if available
- Authors
-
Sarvesh Tanwar, Sumit Badotra, Medini Gupta, Ajay RanaList of authors in order
- Landing page
-
https://doi.org/10.6703/ijase.202109_18(5).010Publisher landing page
- PDF URL
-
https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdfDirect OA link when available
- Concepts
-
Digital signature, Computer security, Signature (topology), Computer science, Ring signature, Adversary, ElGamal signature scheme, Merkle signature scheme, Scheme (mathematics), Blind signature, Digital Signature Algorithm, Schnorr signature, Mathematics, Hash function, Geometry, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
20Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 8, 2023: 6, 2022: 4, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
38Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3200988896 |
|---|---|
| doi | https://doi.org/10.6703/ijase.202109_18(5).010 |
| ids.doi | https://doi.org/10.6703/ijase.202109_18(5).010 |
| ids.mag | 3200988896 |
| ids.openalex | https://openalex.org/W3200988896 |
| fwci | 2.68096793 |
| type | article |
| title | Efficient and secure multiple digital signature to prevent forgery based on ECC |
| biblio.issue | 5 |
| biblio.volume | 18 |
| biblio.last_page | 7 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T11424 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9912999868392944 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Security and Verification in Computing |
| topics[1].id | https://openalex.org/T11614 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9815000295639038 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Cloud Data Security Solutions |
| topics[2].id | https://openalex.org/T12034 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9790999889373779 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Digital and Cyber Forensics |
| is_xpac | False |
| apc_list.value | 200 |
| apc_list.currency | USD |
| apc_list.value_usd | 200 |
| apc_paid.value | 200 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 200 |
| concepts[0].id | https://openalex.org/C118463975 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7965985536575317 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q220849 |
| concepts[0].display_name | Digital signature |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6710679531097412 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C2779696439 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6436964273452759 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7512811 |
| concepts[2].display_name | Signature (topology) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6054480075836182 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C168941894 |
| concepts[4].level | 4 |
| concepts[4].score | 0.5745320916175842 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3483645 |
| concepts[4].display_name | Ring signature |
| concepts[5].id | https://openalex.org/C41065033 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5650824308395386 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2825412 |
| concepts[5].display_name | Adversary |
| concepts[6].id | https://openalex.org/C132860680 |
| concepts[6].level | 5 |
| concepts[6].score | 0.5637056231498718 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1328731 |
| concepts[6].display_name | ElGamal signature scheme |
| concepts[7].id | https://openalex.org/C40404285 |
| concepts[7].level | 5 |
| concepts[7].score | 0.5622091293334961 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1921816 |
| concepts[7].display_name | Merkle signature scheme |
| concepts[8].id | https://openalex.org/C77618280 |
| concepts[8].level | 2 |
| concepts[8].score | 0.5380356907844543 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[8].display_name | Scheme (mathematics) |
| concepts[9].id | https://openalex.org/C18899389 |
| concepts[9].level | 4 |
| concepts[9].score | 0.522255003452301 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2736593 |
| concepts[9].display_name | Blind signature |
| concepts[10].id | https://openalex.org/C202424057 |
| concepts[10].level | 4 |
| concepts[10].score | 0.49637752771377563 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1224829 |
| concepts[10].display_name | Digital Signature Algorithm |
| concepts[11].id | https://openalex.org/C124968333 |
| concepts[11].level | 5 |
| concepts[11].score | 0.4947182834148407 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1465057 |
| concepts[11].display_name | Schnorr signature |
| concepts[12].id | https://openalex.org/C33923547 |
| concepts[12].level | 0 |
| concepts[12].score | 0.19329071044921875 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[12].display_name | Mathematics |
| concepts[13].id | https://openalex.org/C99138194 |
| concepts[13].level | 2 |
| concepts[13].score | 0.09901300072669983 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[13].display_name | Hash function |
| concepts[14].id | https://openalex.org/C2524010 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[14].display_name | Geometry |
| concepts[15].id | https://openalex.org/C134306372 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[15].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/digital-signature |
| keywords[0].score | 0.7965985536575317 |
| keywords[0].display_name | Digital signature |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.6710679531097412 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/signature |
| keywords[2].score | 0.6436964273452759 |
| keywords[2].display_name | Signature (topology) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6054480075836182 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/ring-signature |
| keywords[4].score | 0.5745320916175842 |
| keywords[4].display_name | Ring signature |
| keywords[5].id | https://openalex.org/keywords/adversary |
| keywords[5].score | 0.5650824308395386 |
| keywords[5].display_name | Adversary |
| keywords[6].id | https://openalex.org/keywords/elgamal-signature-scheme |
| keywords[6].score | 0.5637056231498718 |
| keywords[6].display_name | ElGamal signature scheme |
| keywords[7].id | https://openalex.org/keywords/merkle-signature-scheme |
| keywords[7].score | 0.5622091293334961 |
| keywords[7].display_name | Merkle signature scheme |
| keywords[8].id | https://openalex.org/keywords/scheme |
| keywords[8].score | 0.5380356907844543 |
| keywords[8].display_name | Scheme (mathematics) |
| keywords[9].id | https://openalex.org/keywords/blind-signature |
| keywords[9].score | 0.522255003452301 |
| keywords[9].display_name | Blind signature |
| keywords[10].id | https://openalex.org/keywords/digital-signature-algorithm |
| keywords[10].score | 0.49637752771377563 |
| keywords[10].display_name | Digital Signature Algorithm |
| keywords[11].id | https://openalex.org/keywords/schnorr-signature |
| keywords[11].score | 0.4947182834148407 |
| keywords[11].display_name | Schnorr signature |
| keywords[12].id | https://openalex.org/keywords/mathematics |
| keywords[12].score | 0.19329071044921875 |
| keywords[12].display_name | Mathematics |
| keywords[13].id | https://openalex.org/keywords/hash-function |
| keywords[13].score | 0.09901300072669983 |
| keywords[13].display_name | Hash function |
| language | en |
| locations[0].id | doi:10.6703/ijase.202109_18(5).010 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764616918 |
| locations[0].source.issn | 1727-2394, 1727-7841 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1727-2394 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | International Journal of Applied Science and Engineering |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Applied Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.6703/ijase.202109_18(5).010 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5014352670 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0136-0182 |
| authorships[0].author.display_name | Sarvesh Tanwar |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I191972202 |
| authorships[0].affiliations[0].raw_affiliation_string | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| authorships[0].institutions[0].id | https://openalex.org/I191972202 |
| authorships[0].institutions[0].ror | https://ror.org/02n9z0v62 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I191972202 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amity University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sarvesh Tanwar |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| authorships[1].author.id | https://openalex.org/A5055578224 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1950-5386 |
| authorships[1].author.display_name | Sumit Badotra |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I110360157 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India |
| authorships[1].institutions[0].id | https://openalex.org/I110360157 |
| authorships[1].institutions[0].ror | https://ror.org/00et6q107 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I110360157 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Lovely Professional University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Sumit Badotra |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India |
| authorships[2].author.id | https://openalex.org/A5001257390 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Medini Gupta |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I191972202 |
| authorships[2].affiliations[0].raw_affiliation_string | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| authorships[2].institutions[0].id | https://openalex.org/I191972202 |
| authorships[2].institutions[0].ror | https://ror.org/02n9z0v62 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I191972202 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Amity University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Medini Gupta |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| authorships[3].author.id | https://openalex.org/A5083370047 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-1681-3132 |
| authorships[3].author.display_name | Ajay Rana |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I191972202 |
| authorships[3].affiliations[0].raw_affiliation_string | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| authorships[3].institutions[0].id | https://openalex.org/I191972202 |
| authorships[3].institutions[0].ror | https://ror.org/02n9z0v62 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I191972202 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Amity University |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Ajay Rana |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Efficient and secure multiple digital signature to prevent forgery based on ECC |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11424 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9912999868392944 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Security and Verification in Computing |
| related_works | https://openalex.org/W2392378177, https://openalex.org/W2363288909, https://openalex.org/W3129949498, https://openalex.org/W2606299826, https://openalex.org/W2804832731, https://openalex.org/W2378301157, https://openalex.org/W2100860967, https://openalex.org/W2384394054, https://openalex.org/W1881844432, https://openalex.org/W2391818925 |
| cited_by_count | 20 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 8 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 6 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 4 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.6703/ijase.202109_18(5).010 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764616918 |
| best_oa_location.source.issn | 1727-2394, 1727-7841 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1727-2394 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | International Journal of Applied Science and Engineering |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Applied Science and Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.6703/ijase.202109_18(5).010 |
| primary_location.id | doi:10.6703/ijase.202109_18(5).010 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764616918 |
| primary_location.source.issn | 1727-2394, 1727-7841 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1727-2394 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | International Journal of Applied Science and Engineering |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://gigvvy.com/journals/ijase/articles/ijase-202109-18-5-010.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Applied Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.6703/ijase.202109_18(5).010 |
| publication_date | 2021-01-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2980229797, https://openalex.org/W6793672156, https://openalex.org/W3109575315, https://openalex.org/W6761327250, https://openalex.org/W2883280828, https://openalex.org/W2810201222, https://openalex.org/W6783367702, https://openalex.org/W1008300960, https://openalex.org/W2002932355, https://openalex.org/W4296585819, https://openalex.org/W4205113656, https://openalex.org/W6631482837, https://openalex.org/W6659377740, https://openalex.org/W3121996276, https://openalex.org/W6651121328, https://openalex.org/W1902100897, https://openalex.org/W1569083856, https://openalex.org/W6800802112, https://openalex.org/W3108667781, https://openalex.org/W2985948348, https://openalex.org/W6701356594, https://openalex.org/W2133457516, https://openalex.org/W2590118268, https://openalex.org/W2164140673, https://openalex.org/W6651044200, https://openalex.org/W3090647083, https://openalex.org/W2887336835, https://openalex.org/W3198948396, https://openalex.org/W2324454309, https://openalex.org/W4245047333, https://openalex.org/W3152455834, https://openalex.org/W2098290044, https://openalex.org/W1537952987, https://openalex.org/W2003736153, https://openalex.org/W3126725809, https://openalex.org/W2003185355, https://openalex.org/W1524770787, https://openalex.org/W2929257776 |
| referenced_works_count | 38 |
| abstract_inverted_index.a | 19, 27, 39 |
| abstract_inverted_index.ID | 54 |
| abstract_inverted_index.We | 51 |
| abstract_inverted_index.an | 53 |
| abstract_inverted_index.be | 2, 43, 48 |
| abstract_inverted_index.by | 15, 36 |
| abstract_inverted_index.in | 25 |
| abstract_inverted_index.is | 34, 74 |
| abstract_inverted_index.it | 46 |
| abstract_inverted_index.of | 29, 69 |
| abstract_inverted_index.on | 11, 65, 83 |
| abstract_inverted_index.to | 4, 42, 75 |
| abstract_inverted_index.ECC | 84 |
| abstract_inverted_index.For | 38 |
| abstract_inverted_index.The | 67 |
| abstract_inverted_index.and | 22, 31, 77 |
| abstract_inverted_index.are | 13 |
| abstract_inverted_index.can | 1 |
| abstract_inverted_index.out | 73 |
| abstract_inverted_index.the | 70 |
| abstract_inverted_index.ECC. | 66 |
| abstract_inverted_index.able | 3 |
| abstract_inverted_index.him. | 37 |
| abstract_inverted_index.pair | 28 |
| abstract_inverted_index.with | 18 |
| abstract_inverted_index.work | 71 |
| abstract_inverted_index.based | 55, 64, 82 |
| abstract_inverted_index.else, | 17 |
| abstract_inverted_index.multi | 79 |
| abstract_inverted_index.valid | 9, 32 |
| abstract_inverted_index.where | 8 |
| abstract_inverted_index.which | 26 |
| abstract_inverted_index.attack | 63 |
| abstract_inverted_index.design | 76 |
| abstract_inverted_index.scheme | 41, 58 |
| abstract_inverted_index.secure | 59 |
| abstract_inverted_index.should | 47 |
| abstract_inverted_index.against | 60, 85 |
| abstract_inverted_index.attack. | 88 |
| abstract_inverted_index.carried | 72 |
| abstract_inverted_index.created | 14, 35 |
| abstract_inverted_index.digital | 80 |
| abstract_inverted_index.forgery | 7, 62, 87 |
| abstract_inverted_index.message | 12, 30 |
| abstract_inverted_index.perform | 5 |
| abstract_inverted_index.present | 52 |
| abstract_inverted_index.secured | 49 |
| abstract_inverted_index.someone | 16 |
| abstract_inverted_index.forgery, | 24 |
| abstract_inverted_index.multiple | 56 |
| abstract_inverted_index.secured, | 45 |
| abstract_inverted_index.Adversary | 0 |
| abstract_inverted_index.implement | 78 |
| abstract_inverted_index.objective | 68 |
| abstract_inverted_index.perfectly | 44 |
| abstract_inverted_index.selective | 6, 61, 86 |
| abstract_inverted_index.signature | 10, 33, 40, 81 |
| abstract_inverted_index.signatures | 57 |
| abstract_inverted_index.existential | 23 |
| abstract_inverted_index.probability | 21 |
| abstract_inverted_index.significant | 20 |
| abstract_inverted_index.computationally. | 50 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6499999761581421 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.91801087 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |