Practical SM2-Based Multisignature Scheme with Applications to Vehicular Networks Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1155/2021/7897527
In vehicular networks, the increasing value of transportation data and scale of connectivity also brings many security and privacy concerns. Peer authentication and message integrity are two vital security requirements to ensure safe transportation system. Because of the constrained resources of the units performing the cryptographic components, the proposed security-enhancing schemes should be lightweight and scalable. In this paper, we present a multisignature scheme derived from the SM2 signature which enables a group of parties to collaboratively sign a message and generate a compact joint signature at the end. Our scheme requires no preprocessing or interactions among the parties before signing, and its performance matches or surpasses known ones in terms of signing time, verification time, and signature size. Therefore, our scheme is also suitable for vehicular networks, with the goal to enhance security with small computation and storage cost.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.1155/2021/7897527
- https://downloads.hindawi.com/journals/scn/2021/7897527.pdf
- OA Status
- hybrid
- Cited By
- 2
- References
- 23
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3210405122
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3210405122Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2021/7897527Digital Object Identifier
- Title
-
Practical SM2-Based Multisignature Scheme with Applications to Vehicular NetworksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-10-27Full publication date if available
- Authors
-
Lin Hou, Wei Liu, Lisha Yao, Xiaojian Liang, Guo‐Qiang ZengList of authors in order
- Landing page
-
https://doi.org/10.1155/2021/7897527Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/scn/2021/7897527.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/scn/2021/7897527.pdfDirect OA link when available
- Concepts
-
Computer science, Scalability, Scheme (mathematics), Computer security, Authentication (law), Cryptography, Digital signature, Computer network, Signature (topology), Hash function, Mathematical analysis, Geometry, Database, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 1, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
23Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3210405122 |
|---|---|
| doi | https://doi.org/10.1155/2021/7897527 |
| ids.doi | https://doi.org/10.1155/2021/7897527 |
| ids.mag | 3210405122 |
| ids.openalex | https://openalex.org/W3210405122 |
| fwci | 0.28220715 |
| type | article |
| title | Practical SM2-Based Multisignature Scheme with Applications to Vehicular Networks |
| awards[0].id | https://openalex.org/G389725061 |
| awards[0].funder_id | https://openalex.org/F4320321001 |
| awards[0].display_name | |
| awards[0].funder_award_id | 2020B0101090004 |
| awards[0].funder_display_name | National Natural Science Foundation of China |
| awards[1].id | https://openalex.org/G5063198497 |
| awards[1].funder_id | https://openalex.org/F4320336405 |
| awards[1].display_name | |
| awards[1].funder_award_id | 61825203 |
| awards[1].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[2].id | https://openalex.org/G5375606191 |
| awards[2].funder_id | https://openalex.org/F4320321001 |
| awards[2].display_name | |
| awards[2].funder_award_id | 2019B030302008 |
| awards[2].funder_display_name | National Natural Science Foundation of China |
| awards[3].id | https://openalex.org/G695094188 |
| awards[3].funder_id | https://openalex.org/F4320321001 |
| awards[3].display_name | |
| awards[3].funder_award_id | 2020B0101360001 |
| awards[3].funder_display_name | National Natural Science Foundation of China |
| awards[4].id | https://openalex.org/G5195611001 |
| awards[4].funder_id | https://openalex.org/F4320336405 |
| awards[4].display_name | |
| awards[4].funder_award_id | 2020YFB1005600 |
| awards[4].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[5].id | https://openalex.org/G73083603 |
| awards[5].funder_id | https://openalex.org/F4320336405 |
| awards[5].display_name | |
| awards[5].funder_award_id | U1736203 |
| awards[5].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[6].id | https://openalex.org/G4146116996 |
| awards[6].funder_id | https://openalex.org/F4320321001 |
| awards[6].display_name | |
| awards[6].funder_award_id | 2018KQNCX255 |
| awards[6].funder_display_name | National Natural Science Foundation of China |
| awards[7].id | https://openalex.org/G6480402096 |
| awards[7].funder_id | https://openalex.org/F4320336405 |
| awards[7].display_name | |
| awards[7].funder_award_id | 61902067 |
| awards[7].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[8].id | https://openalex.org/G8240610037 |
| awards[8].funder_id | https://openalex.org/F4320336405 |
| awards[8].display_name | |
| awards[8].funder_award_id | 61732021 |
| awards[8].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[9].id | https://openalex.org/G2571898013 |
| awards[9].funder_id | https://openalex.org/F4320336405 |
| awards[9].display_name | |
| awards[9].funder_award_id | 2020B0101360001 |
| awards[9].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[10].id | https://openalex.org/G8000689260 |
| awards[10].funder_id | https://openalex.org/F4320336405 |
| awards[10].display_name | |
| awards[10].funder_award_id | 2018KQNCX255 |
| awards[10].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[11].id | https://openalex.org/G8753560944 |
| awards[11].funder_id | https://openalex.org/F4320336405 |
| awards[11].display_name | |
| awards[11].funder_award_id | 2020B0101090004 |
| awards[11].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[12].id | https://openalex.org/G5797141846 |
| awards[12].funder_id | https://openalex.org/F4320321001 |
| awards[12].display_name | |
| awards[12].funder_award_id | 61732021 |
| awards[12].funder_display_name | National Natural Science Foundation of China |
| awards[13].id | https://openalex.org/G4029245204 |
| awards[13].funder_id | https://openalex.org/F4320321001 |
| awards[13].display_name | |
| awards[13].funder_award_id | 2020YFB1005600 |
| awards[13].funder_display_name | National Natural Science Foundation of China |
| awards[14].id | https://openalex.org/G6672396990 |
| awards[14].funder_id | https://openalex.org/F4320336405 |
| awards[14].display_name | |
| awards[14].funder_award_id | 2019B030302008 |
| awards[14].funder_display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| awards[15].id | https://openalex.org/G1427926582 |
| awards[15].funder_id | https://openalex.org/F4320321001 |
| awards[15].display_name | |
| awards[15].funder_award_id | U1736203 |
| awards[15].funder_display_name | National Natural Science Foundation of China |
| awards[16].id | https://openalex.org/G2156776252 |
| awards[16].funder_id | https://openalex.org/F4320321001 |
| awards[16].display_name | |
| awards[16].funder_award_id | 61902067 |
| awards[16].funder_display_name | National Natural Science Foundation of China |
| awards[17].id | https://openalex.org/G6220089879 |
| awards[17].funder_id | https://openalex.org/F4320321001 |
| awards[17].display_name | |
| awards[17].funder_award_id | 61825203 |
| awards[17].funder_display_name | National Natural Science Foundation of China |
| biblio.issue | |
| biblio.volume | 2021 |
| biblio.last_page | 8 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9991999864578247 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T10764 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9876999855041504 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Privacy-Preserving Technologies in Data |
| funders[0].id | https://openalex.org/F4320321001 |
| funders[0].ror | https://ror.org/01h0zpd94 |
| funders[0].display_name | National Natural Science Foundation of China |
| funders[1].id | https://openalex.org/F4320336405 |
| funders[1].ror | |
| funders[1].display_name | Special Project for Research and Development in Key areas of Guangdong Province |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8917874097824097 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C48044578 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6605212688446045 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[1].display_name | Scalability |
| concepts[2].id | https://openalex.org/C77618280 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5814219117164612 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[2].display_name | Scheme (mathematics) |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.569258987903595 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C148417208 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5419924259185791 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[4].display_name | Authentication (law) |
| concepts[5].id | https://openalex.org/C178489894 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5373460650444031 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[5].display_name | Cryptography |
| concepts[6].id | https://openalex.org/C118463975 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4998650550842285 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q220849 |
| concepts[6].display_name | Digital signature |
| concepts[7].id | https://openalex.org/C31258907 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4815447926521301 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[7].display_name | Computer network |
| concepts[8].id | https://openalex.org/C2779696439 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4770357310771942 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q7512811 |
| concepts[8].display_name | Signature (topology) |
| concepts[9].id | https://openalex.org/C99138194 |
| concepts[9].level | 2 |
| concepts[9].score | 0.09220495820045471 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[9].display_name | Hash function |
| concepts[10].id | https://openalex.org/C134306372 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[10].display_name | Mathematical analysis |
| concepts[11].id | https://openalex.org/C2524010 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[11].display_name | Geometry |
| concepts[12].id | https://openalex.org/C77088390 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[12].display_name | Database |
| concepts[13].id | https://openalex.org/C33923547 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[13].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8917874097824097 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/scalability |
| keywords[1].score | 0.6605212688446045 |
| keywords[1].display_name | Scalability |
| keywords[2].id | https://openalex.org/keywords/scheme |
| keywords[2].score | 0.5814219117164612 |
| keywords[2].display_name | Scheme (mathematics) |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.569258987903595 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/authentication |
| keywords[4].score | 0.5419924259185791 |
| keywords[4].display_name | Authentication (law) |
| keywords[5].id | https://openalex.org/keywords/cryptography |
| keywords[5].score | 0.5373460650444031 |
| keywords[5].display_name | Cryptography |
| keywords[6].id | https://openalex.org/keywords/digital-signature |
| keywords[6].score | 0.4998650550842285 |
| keywords[6].display_name | Digital signature |
| keywords[7].id | https://openalex.org/keywords/computer-network |
| keywords[7].score | 0.4815447926521301 |
| keywords[7].display_name | Computer network |
| keywords[8].id | https://openalex.org/keywords/signature |
| keywords[8].score | 0.4770357310771942 |
| keywords[8].display_name | Signature (topology) |
| keywords[9].id | https://openalex.org/keywords/hash-function |
| keywords[9].score | 0.09220495820045471 |
| keywords[9].display_name | Hash function |
| language | en |
| locations[0].id | doi:10.1155/2021/7897527 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120683614 |
| locations[0].source.issn | 1939-0114, 1939-0122 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1939-0114 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Security and Communication Networks |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/scn/2021/7897527.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Security and Communication Networks |
| locations[0].landing_page_url | http://doi.org/10.1155/2021/7897527 |
| locations[1].id | pmh:oai:doaj.org/article:73ee2ad80baf40df84ddfa2a2ebd5379 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Security and Communication Networks, Vol 2021 (2021) |
| locations[1].landing_page_url | https://doaj.org/article/73ee2ad80baf40df84ddfa2a2ebd5379 |
| locations[2].id | pmh:oai:hindawi.com:10.1155/2021/7897527 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400340 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | Hindawi Journal of Chemistry (Hindawi) |
| locations[2].source.host_organization | https://openalex.org/I4210126990 |
| locations[2].source.host_organization_name | Hindawi (United Kingdom) |
| locations[2].source.host_organization_lineage | https://openalex.org/I4210126990 |
| locations[2].license | cc-by |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | Research Article |
| locations[2].license_id | https://openalex.org/licenses/cc-by |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.1155/2021/7897527 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5102965608 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-2462-0250 |
| authorships[0].author.display_name | Lin Hou |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I159948400 |
| authorships[0].affiliations[0].raw_affiliation_string | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[0].institutions[0].id | https://openalex.org/I159948400 |
| authorships[0].institutions[0].ror | https://ror.org/02xe5ns62 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I159948400 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Jinan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Lin Hou |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[1].author.id | https://openalex.org/A5100690554 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2813-9464 |
| authorships[1].author.display_name | Wei Liu |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I159948400 |
| authorships[1].affiliations[0].raw_affiliation_string | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[1].institutions[0].id | https://openalex.org/I159948400 |
| authorships[1].institutions[0].ror | https://ror.org/02xe5ns62 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I159948400 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Jinan University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wei Liu |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[2].author.id | https://openalex.org/A5073950075 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-1497-9235 |
| authorships[2].author.display_name | Lisha Yao |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I159948400 |
| authorships[2].affiliations[0].raw_affiliation_string | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[2].institutions[0].id | https://openalex.org/I159948400 |
| authorships[2].institutions[0].ror | https://ror.org/02xe5ns62 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I159948400 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Jinan University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Lisha Yao |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[3].author.id | https://openalex.org/A5038013468 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Xiaojian Liang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I159948400 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[3].institutions[0].id | https://openalex.org/I159948400 |
| authorships[3].institutions[0].ror | https://ror.org/02xe5ns62 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I159948400 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Jinan University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Xiaojian Liang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Information Science and Technology, Jinan University, Guangzhou 510632, China |
| authorships[4].author.id | https://openalex.org/A5046775963 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-7453-7420 |
| authorships[4].author.display_name | Guo‐Qiang Zeng |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I159948400 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Cyber Security and the National Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou 510632, China |
| authorships[4].institutions[0].id | https://openalex.org/I159948400 |
| authorships[4].institutions[0].ror | https://ror.org/02xe5ns62 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I159948400 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Jinan University |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Guo-Qiang Zeng |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Cyber Security and the National Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou 510632, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/scn/2021/7897527.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Practical SM2-Based Multisignature Scheme with Applications to Vehicular Networks |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2149234266, https://openalex.org/W2390942931, https://openalex.org/W1932157736, https://openalex.org/W2104321465, https://openalex.org/W4250384982, https://openalex.org/W2892743407, https://openalex.org/W1601957798, https://openalex.org/W2125461068, https://openalex.org/W773319083, https://openalex.org/W2776010770 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.1155/2021/7897527 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120683614 |
| best_oa_location.source.issn | 1939-0114, 1939-0122 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1939-0114 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Security and Communication Networks |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/scn/2021/7897527.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Security and Communication Networks |
| best_oa_location.landing_page_url | http://doi.org/10.1155/2021/7897527 |
| primary_location.id | doi:10.1155/2021/7897527 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120683614 |
| primary_location.source.issn | 1939-0114, 1939-0122 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1939-0114 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Security and Communication Networks |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/scn/2021/7897527.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Security and Communication Networks |
| primary_location.landing_page_url | http://doi.org/10.1155/2021/7897527 |
| publication_date | 2021-10-27 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2770104341, https://openalex.org/W2900738106, https://openalex.org/W2922171833, https://openalex.org/W3088323682, https://openalex.org/W2889118520, https://openalex.org/W2164736940, https://openalex.org/W1788452017, https://openalex.org/W2959308782, https://openalex.org/W1998473519, https://openalex.org/W2089800851, https://openalex.org/W2963997141, https://openalex.org/W2717184009, https://openalex.org/W2927855747, https://openalex.org/W2794784663, https://openalex.org/W2811448169, https://openalex.org/W2166462813, https://openalex.org/W4298171975, https://openalex.org/W44936433, https://openalex.org/W147290027, https://openalex.org/W2994832897, https://openalex.org/W2794124131, https://openalex.org/W2949625142, https://openalex.org/W200023587 |
| referenced_works_count | 23 |
| abstract_inverted_index.a | 61, 71, 78, 82 |
| abstract_inverted_index.In | 0, 56 |
| abstract_inverted_index.at | 86 |
| abstract_inverted_index.be | 52 |
| abstract_inverted_index.in | 109 |
| abstract_inverted_index.is | 122 |
| abstract_inverted_index.no | 92 |
| abstract_inverted_index.of | 6, 11, 36, 40, 73, 111 |
| abstract_inverted_index.or | 94, 105 |
| abstract_inverted_index.to | 30, 75, 131 |
| abstract_inverted_index.we | 59 |
| abstract_inverted_index.Our | 89 |
| abstract_inverted_index.SM2 | 67 |
| abstract_inverted_index.and | 9, 17, 22, 54, 80, 101, 116, 137 |
| abstract_inverted_index.are | 25 |
| abstract_inverted_index.for | 125 |
| abstract_inverted_index.its | 102 |
| abstract_inverted_index.our | 120 |
| abstract_inverted_index.the | 3, 37, 41, 44, 47, 66, 87, 97, 129 |
| abstract_inverted_index.two | 26 |
| abstract_inverted_index.Peer | 20 |
| abstract_inverted_index.also | 13, 123 |
| abstract_inverted_index.data | 8 |
| abstract_inverted_index.end. | 88 |
| abstract_inverted_index.from | 65 |
| abstract_inverted_index.goal | 130 |
| abstract_inverted_index.many | 15 |
| abstract_inverted_index.ones | 108 |
| abstract_inverted_index.safe | 32 |
| abstract_inverted_index.sign | 77 |
| abstract_inverted_index.this | 57 |
| abstract_inverted_index.with | 128, 134 |
| abstract_inverted_index.among | 96 |
| abstract_inverted_index.cost. | 139 |
| abstract_inverted_index.group | 72 |
| abstract_inverted_index.joint | 84 |
| abstract_inverted_index.known | 107 |
| abstract_inverted_index.scale | 10 |
| abstract_inverted_index.size. | 118 |
| abstract_inverted_index.small | 135 |
| abstract_inverted_index.terms | 110 |
| abstract_inverted_index.time, | 113, 115 |
| abstract_inverted_index.units | 42 |
| abstract_inverted_index.value | 5 |
| abstract_inverted_index.vital | 27 |
| abstract_inverted_index.which | 69 |
| abstract_inverted_index.before | 99 |
| abstract_inverted_index.brings | 14 |
| abstract_inverted_index.ensure | 31 |
| abstract_inverted_index.paper, | 58 |
| abstract_inverted_index.scheme | 63, 90, 121 |
| abstract_inverted_index.should | 51 |
| abstract_inverted_index.Because | 35 |
| abstract_inverted_index.compact | 83 |
| abstract_inverted_index.derived | 64 |
| abstract_inverted_index.enables | 70 |
| abstract_inverted_index.enhance | 132 |
| abstract_inverted_index.matches | 104 |
| abstract_inverted_index.message | 23, 79 |
| abstract_inverted_index.parties | 74, 98 |
| abstract_inverted_index.present | 60 |
| abstract_inverted_index.privacy | 18 |
| abstract_inverted_index.schemes | 50 |
| abstract_inverted_index.signing | 112 |
| abstract_inverted_index.storage | 138 |
| abstract_inverted_index.system. | 34 |
| abstract_inverted_index.generate | 81 |
| abstract_inverted_index.proposed | 48 |
| abstract_inverted_index.requires | 91 |
| abstract_inverted_index.security | 16, 28, 133 |
| abstract_inverted_index.signing, | 100 |
| abstract_inverted_index.suitable | 124 |
| abstract_inverted_index.concerns. | 19 |
| abstract_inverted_index.integrity | 24 |
| abstract_inverted_index.networks, | 2, 127 |
| abstract_inverted_index.resources | 39 |
| abstract_inverted_index.scalable. | 55 |
| abstract_inverted_index.signature | 68, 85, 117 |
| abstract_inverted_index.surpasses | 106 |
| abstract_inverted_index.vehicular | 1, 126 |
| abstract_inverted_index.Therefore, | 119 |
| abstract_inverted_index.increasing | 4 |
| abstract_inverted_index.performing | 43 |
| abstract_inverted_index.components, | 46 |
| abstract_inverted_index.computation | 136 |
| abstract_inverted_index.constrained | 38 |
| abstract_inverted_index.lightweight | 53 |
| abstract_inverted_index.performance | 103 |
| abstract_inverted_index.connectivity | 12 |
| abstract_inverted_index.interactions | 95 |
| abstract_inverted_index.requirements | 29 |
| abstract_inverted_index.verification | 114 |
| abstract_inverted_index.cryptographic | 45 |
| abstract_inverted_index.preprocessing | 93 |
| abstract_inverted_index.authentication | 21 |
| abstract_inverted_index.multisignature | 62 |
| abstract_inverted_index.transportation | 7, 33 |
| abstract_inverted_index.collaboratively | 76 |
| abstract_inverted_index.security-enhancing | 49 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5100690554 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I159948400 |
| citation_normalized_percentile.value | 0.65025473 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |