Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3390/e27101060
Blockchain-based cold chain logistics (BCCL) systems establish a new logistics data-sharing mechanism with blockchain technology, which destroys the traditional data island problem and promotes cross-institutional data interoperability. However, security vulnerabilities, risks of data loss, exposure of private information, and particularly the emergence of quantum-based attacks pose heightened threats to the existing BCCL framework. This paper first introduces a transaction privacy preserving (TPP) model for BCCLS that aggregates the blockchain and ring signcryption scheme together to strengthen the security of the data exchange process. Then, a lattice-based ring signcryption (LRSC) scheme is proposed. This LRSC utilizes the lattice assumption to enhance resistance against quantum attacks while employing ring mechanisms to safeguard the anonymity and privacy of the actual signer. It also executes signature and encryption algorithms simultaneously to improve algorithm execution efficiency. Moreover, the formal security proof results show that this LRSC can capture the signer’s confidentiality and unforgeability. Experimental findings indicate that the LRSC scheme achieves higher efficiency compared with comparable approaches. The proposed TPP model and LRSC scheme effectively facilitate cross-institutional logistics data exchange and enhance the utilization of logistics information via the BCCL system.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/e27101060
- https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315
- OA Status
- gold
- References
- 43
- OpenAlex ID
- https://openalex.org/W4415101125
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4415101125Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/e27101060Digital Object Identifier
- Title
-
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCLWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-10-12Full publication date if available
- Authors
-
Yang Zhang, Peikai Duan, Chaoyang Li, Haseeb Ahmad, Hua ZhangList of authors in order
- Landing page
-
https://doi.org/10.3390/e27101060Publisher landing page
- PDF URL
-
https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
43Number of works referenced by this work
Full payload
| id | https://openalex.org/W4415101125 |
|---|---|
| doi | https://doi.org/10.3390/e27101060 |
| ids.doi | https://doi.org/10.3390/e27101060 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/41149018 |
| ids.openalex | https://openalex.org/W4415101125 |
| fwci | 0.0 |
| type | article |
| title | Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL |
| biblio.issue | 10 |
| biblio.volume | 27 |
| biblio.last_page | 1060 |
| biblio.first_page | 1060 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9955999851226807 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T11130 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.965399980545044 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Coding theory and cryptography |
| topics[2].id | https://openalex.org/T13999 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9642999768257141 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Digital Rights Management and Security |
| is_xpac | False |
| apc_list.value | 2000 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2165 |
| apc_paid.value | 2000 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2165 |
| language | en |
| locations[0].id | doi:10.3390/e27101060 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S195231649 |
| locations[0].source.issn | 1099-4300 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1099-4300 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Entropy |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Entropy |
| locations[0].landing_page_url | https://doi.org/10.3390/e27101060 |
| locations[1].id | pmid:41149018 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Entropy (Basel, Switzerland) |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/41149018 |
| locations[2].id | pmh:oai:doaj.org/article:f2b9d53725fe4d7380e384bfce540481 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | Entropy, Vol 27, Iss 10, p 1060 (2025) |
| locations[2].landing_page_url | https://doaj.org/article/f2b9d53725fe4d7380e384bfce540481 |
| locations[3].id | pmh:oai:europepmc.org:11371396 |
| locations[3].is_oa | True |
| locations[3].source.id | https://openalex.org/S4306400806 |
| locations[3].source.issn | |
| locations[3].source.type | repository |
| locations[3].source.is_oa | False |
| locations[3].source.issn_l | |
| locations[3].source.is_core | False |
| locations[3].source.is_in_doaj | False |
| locations[3].source.display_name | Europe PMC (PubMed Central) |
| locations[3].source.host_organization | https://openalex.org/I1303153112 |
| locations[3].source.host_organization_name | European Bioinformatics Institute |
| locations[3].source.host_organization_lineage | https://openalex.org/I1303153112 |
| locations[3].license | other-oa |
| locations[3].pdf_url | |
| locations[3].version | submittedVersion |
| locations[3].raw_type | Text |
| locations[3].license_id | https://openalex.org/licenses/other-oa |
| locations[3].is_accepted | False |
| locations[3].is_published | False |
| locations[3].raw_source_name | |
| locations[3].landing_page_url | https://www.ncbi.nlm.nih.gov/pmc/articles/12563048 |
| indexed_in | crossref, doaj, pubmed |
| authorships[0].author.id | https://openalex.org/A5100354785 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-2602-3326 |
| authorships[0].author.display_name | Yang Zhang |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I23171815 |
| authorships[0].affiliations[0].raw_affiliation_string | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[0].institutions[0].id | https://openalex.org/I23171815 |
| authorships[0].institutions[0].ror | https://ror.org/05fwr8z16 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I23171815 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Zhengzhou University of Light Industry |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yang Zhang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[1].author.id | https://openalex.org/A5113026927 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Peikai Duan |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I23171815 |
| authorships[1].affiliations[0].raw_affiliation_string | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[1].institutions[0].id | https://openalex.org/I23171815 |
| authorships[1].institutions[0].ror | https://ror.org/05fwr8z16 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I23171815 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Zhengzhou University of Light Industry |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Pengxiao Duan |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[2].author.id | https://openalex.org/A5100712867 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-1455-2714 |
| authorships[2].author.display_name | Chaoyang Li |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I23171815 |
| authorships[2].affiliations[0].raw_affiliation_string | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[2].institutions[0].id | https://openalex.org/I23171815 |
| authorships[2].institutions[0].ror | https://ror.org/05fwr8z16 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I23171815 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Zhengzhou University of Light Industry |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Chaoyang Li |
| authorships[2].is_corresponding | True |
| authorships[2].raw_affiliation_strings | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[3].author.id | https://openalex.org/A5076870712 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-6359-7452 |
| authorships[3].author.display_name | Haseeb Ahmad |
| authorships[3].countries | PK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I505182 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science, National Textile University, Faisalabad 37610, Pakistan |
| authorships[3].institutions[0].id | https://openalex.org/I505182 |
| authorships[3].institutions[0].ror | https://ror.org/030dak672 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I505182 |
| authorships[3].institutions[0].country_code | PK |
| authorships[3].institutions[0].display_name | National Textile University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Haseeb Ahmad |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science, National Textile University, Faisalabad 37610, Pakistan |
| authorships[4].author.id | https://openalex.org/A5101604076 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-0564-035X |
| authorships[4].author.display_name | Hua Zhang |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I23171815 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| authorships[4].institutions[0].id | https://openalex.org/I23171815 |
| authorships[4].institutions[0].ror | https://ror.org/05fwr8z16 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I23171815 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Zhengzhou University of Light Industry |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Hua Zhang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-13T00:00:00 |
| display_name | Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9955999851226807 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| cited_by_count | 0 |
| locations_count | 4 |
| best_oa_location.id | doi:10.3390/e27101060 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S195231649 |
| best_oa_location.source.issn | 1099-4300 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1099-4300 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Entropy |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Entropy |
| best_oa_location.landing_page_url | https://doi.org/10.3390/e27101060 |
| primary_location.id | doi:10.3390/e27101060 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S195231649 |
| primary_location.source.issn | 1099-4300 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1099-4300 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Entropy |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/1099-4300/27/10/1060/pdf?version=1760359315 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Entropy |
| primary_location.landing_page_url | https://doi.org/10.3390/e27101060 |
| publication_date | 2025-10-12 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4400188403, https://openalex.org/W3174265232, https://openalex.org/W4289346384, https://openalex.org/W3173387943, https://openalex.org/W4284959768, https://openalex.org/W4321606716, https://openalex.org/W4394966851, https://openalex.org/W4407782722, https://openalex.org/W3020939236, https://openalex.org/W3028794039, https://openalex.org/W4285742277, https://openalex.org/W4413785573, https://openalex.org/W4413940425, https://openalex.org/W3066517125, https://openalex.org/W4409311387, https://openalex.org/W4220704506, https://openalex.org/W4400770835, https://openalex.org/W4402897951, https://openalex.org/W4408858571, https://openalex.org/W2971022245, https://openalex.org/W4291993230, https://openalex.org/W4313461186, https://openalex.org/W4323644127, https://openalex.org/W2137147061, https://openalex.org/W2002372750, https://openalex.org/W4390938911, https://openalex.org/W2746495499, https://openalex.org/W2747474361, https://openalex.org/W4309618162, https://openalex.org/W2914654142, https://openalex.org/W1516634197, https://openalex.org/W4413966878, https://openalex.org/W4405517714, https://openalex.org/W2981766060, https://openalex.org/W3043512232, https://openalex.org/W4400646198, https://openalex.org/W4409581202, https://openalex.org/W4414229501, https://openalex.org/W1598269861, https://openalex.org/W2900370870, https://openalex.org/W2794788384, https://openalex.org/W2150624282, https://openalex.org/W74973629 |
| referenced_works_count | 43 |
| abstract_inverted_index.a | 7, 57, 84 |
| abstract_inverted_index.It | 118 |
| abstract_inverted_index.is | 90 |
| abstract_inverted_index.of | 31, 35, 42, 78, 114, 179 |
| abstract_inverted_index.to | 48, 74, 98, 108, 126 |
| abstract_inverted_index.TPP | 164 |
| abstract_inverted_index.The | 162 |
| abstract_inverted_index.and | 22, 38, 69, 112, 122, 146, 166, 175 |
| abstract_inverted_index.can | 141 |
| abstract_inverted_index.for | 63 |
| abstract_inverted_index.new | 8 |
| abstract_inverted_index.the | 17, 40, 49, 67, 76, 79, 95, 110, 115, 132, 143, 152, 177, 183 |
| abstract_inverted_index.via | 182 |
| abstract_inverted_index.BCCL | 51, 184 |
| abstract_inverted_index.LRSC | 93, 140, 153, 167 |
| abstract_inverted_index.This | 53, 92 |
| abstract_inverted_index.also | 119 |
| abstract_inverted_index.cold | 1 |
| abstract_inverted_index.data | 19, 25, 32, 80, 173 |
| abstract_inverted_index.pose | 45 |
| abstract_inverted_index.ring | 70, 86, 106 |
| abstract_inverted_index.show | 137 |
| abstract_inverted_index.that | 65, 138, 151 |
| abstract_inverted_index.this | 139 |
| abstract_inverted_index.with | 12, 159 |
| abstract_inverted_index.(TPP) | 61 |
| abstract_inverted_index.BCCLS | 64 |
| abstract_inverted_index.Then, | 83 |
| abstract_inverted_index.chain | 2 |
| abstract_inverted_index.first | 55 |
| abstract_inverted_index.loss, | 33 |
| abstract_inverted_index.model | 62, 165 |
| abstract_inverted_index.paper | 54 |
| abstract_inverted_index.proof | 135 |
| abstract_inverted_index.risks | 30 |
| abstract_inverted_index.which | 15 |
| abstract_inverted_index.while | 104 |
| abstract_inverted_index.(BCCL) | 4 |
| abstract_inverted_index.(LRSC) | 88 |
| abstract_inverted_index.actual | 116 |
| abstract_inverted_index.formal | 133 |
| abstract_inverted_index.higher | 156 |
| abstract_inverted_index.island | 20 |
| abstract_inverted_index.scheme | 72, 89, 154, 168 |
| abstract_inverted_index.against | 101 |
| abstract_inverted_index.attacks | 44, 103 |
| abstract_inverted_index.capture | 142 |
| abstract_inverted_index.enhance | 99, 176 |
| abstract_inverted_index.improve | 127 |
| abstract_inverted_index.lattice | 96 |
| abstract_inverted_index.privacy | 59, 113 |
| abstract_inverted_index.private | 36 |
| abstract_inverted_index.problem | 21 |
| abstract_inverted_index.quantum | 102 |
| abstract_inverted_index.results | 136 |
| abstract_inverted_index.signer. | 117 |
| abstract_inverted_index.system. | 185 |
| abstract_inverted_index.systems | 5 |
| abstract_inverted_index.threats | 47 |
| abstract_inverted_index.However, | 27 |
| abstract_inverted_index.achieves | 155 |
| abstract_inverted_index.compared | 158 |
| abstract_inverted_index.destroys | 16 |
| abstract_inverted_index.exchange | 81, 174 |
| abstract_inverted_index.executes | 120 |
| abstract_inverted_index.existing | 50 |
| abstract_inverted_index.exposure | 34 |
| abstract_inverted_index.findings | 149 |
| abstract_inverted_index.indicate | 150 |
| abstract_inverted_index.process. | 82 |
| abstract_inverted_index.promotes | 23 |
| abstract_inverted_index.proposed | 163 |
| abstract_inverted_index.security | 28, 77, 134 |
| abstract_inverted_index.together | 73 |
| abstract_inverted_index.utilizes | 94 |
| abstract_inverted_index.Moreover, | 131 |
| abstract_inverted_index.algorithm | 128 |
| abstract_inverted_index.anonymity | 111 |
| abstract_inverted_index.emergence | 41 |
| abstract_inverted_index.employing | 105 |
| abstract_inverted_index.establish | 6 |
| abstract_inverted_index.execution | 129 |
| abstract_inverted_index.logistics | 3, 9, 172, 180 |
| abstract_inverted_index.mechanism | 11 |
| abstract_inverted_index.proposed. | 91 |
| abstract_inverted_index.safeguard | 109 |
| abstract_inverted_index.signature | 121 |
| abstract_inverted_index.aggregates | 66 |
| abstract_inverted_index.algorithms | 124 |
| abstract_inverted_index.assumption | 97 |
| abstract_inverted_index.blockchain | 13, 68 |
| abstract_inverted_index.comparable | 160 |
| abstract_inverted_index.efficiency | 157 |
| abstract_inverted_index.encryption | 123 |
| abstract_inverted_index.facilitate | 170 |
| abstract_inverted_index.framework. | 52 |
| abstract_inverted_index.heightened | 46 |
| abstract_inverted_index.introduces | 56 |
| abstract_inverted_index.mechanisms | 107 |
| abstract_inverted_index.preserving | 60 |
| abstract_inverted_index.resistance | 100 |
| abstract_inverted_index.signer’s | 144 |
| abstract_inverted_index.strengthen | 75 |
| abstract_inverted_index.approaches. | 161 |
| abstract_inverted_index.effectively | 169 |
| abstract_inverted_index.efficiency. | 130 |
| abstract_inverted_index.information | 181 |
| abstract_inverted_index.technology, | 14 |
| abstract_inverted_index.traditional | 18 |
| abstract_inverted_index.transaction | 58 |
| abstract_inverted_index.utilization | 178 |
| abstract_inverted_index.Experimental | 148 |
| abstract_inverted_index.data-sharing | 10 |
| abstract_inverted_index.information, | 37 |
| abstract_inverted_index.particularly | 39 |
| abstract_inverted_index.signcryption | 71, 87 |
| abstract_inverted_index.lattice-based | 85 |
| abstract_inverted_index.quantum-based | 43 |
| abstract_inverted_index.simultaneously | 125 |
| abstract_inverted_index.confidentiality | 145 |
| abstract_inverted_index.unforgeability. | 147 |
| abstract_inverted_index.Blockchain-based | 0 |
| abstract_inverted_index.vulnerabilities, | 29 |
| abstract_inverted_index.interoperability. | 26 |
| abstract_inverted_index.cross-institutional | 24, 171 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5100712867 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I23171815 |
| citation_normalized_percentile.value | 0.21885231 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |