OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Post-Quantum Blind Signature for Log System in Blockchain
Gang Xu, Yibo Cao, Shiyuan Xu, et al.
Computer Systems Science and Engineering (2021) Vol. 41, Iss. 3, pp. 945-958
Open Access | Times Cited: 23

Showing 23 citing articles:

A secure quantum homomorphic encryption ciphertext retrieval scheme
Zhenwen Cheng, Xiu‐Bo Chen, Gang Xu, et al.
Soft Computing (2025)
Closed Access

PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios
Gang Xu, Shiyuan Xu, Yibo Cao, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 19

Stackelberg Game-Based Resource Allocation with Blockchain for Cold-Chain Logistics System
Yang Zhang, Chaoyang Li, Xiangjun Xin
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 2429-2442
Open Access | Times Cited: 7

Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption
Gang Xu, Fan Yun, Xiu‐Bo Chen, et al.
Intelligent Automation & Soft Computing (2022) Vol. 34, Iss. 1, pp. 531-541
Open Access | Times Cited: 10

A survey analysis of quantum computing adoption and the paradigm of privacy engineering
Nour Mousa, Farid Shirazi
Security and Privacy (2024)
Open Access | Times Cited: 1

A Searchable Encryption Scheme Based on Lattice for Log Systems in燘lockchain
Gang Xu, Yibo Cao, Shiyuan Xu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 3, pp. 5429-5441
Open Access | Times Cited: 6

Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment
G. Li, Xiu‐Bo Chen, Gang Xu, et al.
Quantum Information Processing (2022) Vol. 21, Iss. 11
Closed Access | Times Cited: 6

APKI: An Anonymous Authentication Scheme Based on PKI for VANET
Shuo Jiang, Xue Chen, Yibo Cao, et al.
2022 7th International Conference on Computer and Communication Systems (ICCCS) (2022), pp. 530-536
Closed Access | Times Cited: 4

A blockchain-based log storage model with efficient query
Gang Xu, Fan Yun, Shiyuan Xu, et al.
Soft Computing (2023) Vol. 27, Iss. 19, pp. 13779-13787
Open Access | Times Cited: 2

A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems
Yiyang Xie, Xiu‐Bo Chen, Yixian Yang
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 4

An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption
Pengfei Tan, Z. Qin, Wunan Wan, et al.
Communications in computer and information science (2022), pp. 207-221
Closed Access | Times Cited: 3

A quantum designated multi-verifiers signature scheme based on LIOP states
Ling Zhang, Qi Gui, Xiangjun Xin, et al.
Modern Physics Letters A (2024) Vol. 39, Iss. 23n24
Closed Access

PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT
Bora Buğra Sezer, Sedat Akleylek
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

A lattice‐based blind ring signature scheme for sensitive data protection in blockchain applications
Saba Khanum, Khurram Mustafa
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 26
Closed Access | Times Cited: 1

Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection
Shuhui Zhang, Ruiyao Zhou, Lianhai Wang, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 5010-5010
Open Access | Times Cited: 1

Policy-Based Group Signature Scheme from Lattice
Yongli Tang, Yuanhong Li, Qing Ye, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 2, pp. 4069-4085
Open Access | Times Cited: 1

Quantum Remote State Preparation Based on Quantum Network Coding
Zhenzhen Li, Zichen Li, Yiru Sun, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 1, pp. 119-132
Open Access | Times Cited: 1

Code-based Sequential Aggregate Signature Scheme
Bennian Dou, Lei Xu, Xiaoling Yu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 5219-5231
Open Access | Times Cited: 1

Quantum Voting Protocol Based on Blind Signature
Qiang Yuwei, Sihao Chen, Li Na, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 551-558
Closed Access

Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve Cryptography
Xin Liu, Yang Xu, Gang Xu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access

A blockchain-based log storage model with efficient query
Gang Xu, Fan Yun, Yiying Yu, et al.
Research Square (Research Square) (2022)
Open Access

A Secure Multiparty Quantum Homomorphic Encryption Scheme
Jingwen Zhang, Xiu‐Bo Chen, Gang Xu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 2, pp. 2835-2848
Open Access

A Blockchain-Based IoT Data Secure Vickery Auction System
Haohui Wang, Xiu‐Bo Chen, Haseeb Ahmad, et al.
Communications in computer and information science (2022), pp. 119-133
Closed Access

Page 1

Scroll to top