{"id":"https://openalex.org/W7126101374","doi":"https://doi.org/10.1109/bibm66473.2025.11356211","title":"Efficient and Privacy-Preserving Verifiable Signcryption for Internet of Medical Things","display_name":"Efficient and Privacy-Preserving Verifiable Signcryption for Internet of Medical Things","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7126101374","doi":"https://doi.org/10.1109/bibm66473.2025.11356211"},"language":null,"primary_location":{"id":"doi:10.1109/bibm66473.2025.11356211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069375961","display_name":"Kaiming Wang","orcid":"https://orcid.org/0000-0002-6772-0331"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiming Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124258811","display_name":"Renda Han","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renda Han","raw_affiliation_strings":["School of Computer Science and Technology, Hainan University,Haikou,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hainan University,Haikou,China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069375961"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87964343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"08"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2892000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2892000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.2736999988555908,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.08479999750852585,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.941100001335144},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6495000123977661},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5349000096321106},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4803999960422516},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46389999985694885},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4316999912261963},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4309000074863434},{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.41999998688697815},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41190001368522644},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4092000126838684}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.941100001335144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8119000196456909},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6495000123977661},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6010000109672546},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5349000096321106},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46389999985694885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45750001072883606},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4316999912261963},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4309000074863434},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.41999998688697815},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4092000126838684},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40790000557899475},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.40220001339912415},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.34610000252723694},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3458999991416931},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.328000009059906},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3142000138759613},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C191072391","wikidata":"https://www.wikidata.org/wiki/Q17043235","display_name":"Retrievability","level":3,"score":0.3025999963283539},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2732999920845032},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C119839945","wikidata":"https://www.wikidata.org/wiki/Q6545185","display_name":"Unique identifier","level":3,"score":0.2680000066757202},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.257099986076355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bibm66473.2025.11356211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356211","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.665968120098114,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1516634197","https://openalex.org/W1534748576","https://openalex.org/W1752398301","https://openalex.org/W1991914881","https://openalex.org/W2075738473","https://openalex.org/W2145763283","https://openalex.org/W2152924492","https://openalex.org/W2172174332","https://openalex.org/W2526783369","https://openalex.org/W2766749922","https://openalex.org/W2955829994","https://openalex.org/W3007276239","https://openalex.org/W3018002587","https://openalex.org/W3158731422","https://openalex.org/W4360930323","https://openalex.org/W4365130618","https://openalex.org/W4381713937","https://openalex.org/W4385383460","https://openalex.org/W4387189847","https://openalex.org/W4388407843","https://openalex.org/W4390576786","https://openalex.org/W4391288972","https://openalex.org/W4391697037","https://openalex.org/W4402026915","https://openalex.org/W4403619717","https://openalex.org/W4408520726"],"related_works":[],"abstract_inverted_index":{"The":[0,200],"Internet":[1],"of":[2,115,130,147,157,195,198],"Medical":[3],"Things":[4],"(IoMT)":[5],"has":[6,46,60],"emerged":[7,61],"as":[8,62],"a":[9,63,94],"research":[10],"hotspot":[11],"in":[12,44],"both":[13],"academic":[14],"circles":[15],"and":[16,25,52,69,86,103,120,126,169,209],"medical":[17,116,149],"institutions.":[18],"Within":[19],"IoMT":[20,45,80],"systems,":[21],"IoT":[22],"devices":[23],"collect":[24],"upload":[26],"patient":[27],"data":[28,42,53,104,117],"via":[29],"sensors,":[30],"enabling":[31],"doctors":[32,119],"to":[33,37,82,142],"provide":[34,99],"remote":[35],"treatment":[36],"patients.":[38],"However,":[39],"the":[40,112,128,145,155,196],"sensitive":[41],"involved":[43],"raised":[47],"concerns":[48],"regarding":[49],"user":[50,124],"authentication":[51,102],"privacy.":[54],"To":[55,134],"address":[56],"these":[57],"issues,":[58],"signcryption":[59,74,95],"promising":[64],"solution,":[65],"offering":[66],"integrity,":[67],"confidentiality,":[68],"unforgeability.":[70],"Unfortunately,":[71],"most":[72],"existing":[73,184],"schemes":[75],"are":[76],"not":[77],"practical":[78,208],"for":[79,106],"due":[81],"their":[83],"high":[84],"computational":[85],"storage":[87],"requirements.":[88],"In":[89],"this":[90],"paper,":[91],"we":[92,137],"propose":[93],"scheme":[96,110],"that":[97,181,204],"can":[98],"efficient":[100],"identity":[101],"sharing":[105],"IoMT.":[107],"Our":[108],"designed":[109],"facilitates":[111],"secure":[113],"transmission":[114],"between":[118],"patients,":[121],"effectively":[122],"verifies":[123],"legitimacy,":[125],"minimizes":[127],"risk":[129],"private":[131],"information":[132],"leakage.":[133],"achieve":[135],"this,":[136],"leverage":[138],"aggregate":[139],"signature":[140],"technology":[141],"batch":[143],"verify":[144],"correctness":[146],"patients'":[148],"data.":[150],"We":[151],"also":[152],"formally":[153],"prove":[154],"security":[156],"our":[158,186,205],"proposed":[159],"design,":[160],"including":[161],"existential":[162],"unforgeability":[163],"against":[164,171],"chosen":[165,172],"message":[166],"attack":[167,174],"(EU-CMA)":[168],"indistinguishability":[170],"plaintext":[173],"(IND-CPA).":[175],"Finally,":[176],"comprehensive":[177],"performance":[178],"evaluations":[179],"show":[180],"compared":[182],"with":[183],"schemes,":[185],"verification":[187],"time":[188],"remains":[189],"stable":[190],"at":[191],"0.05":[192],"seconds,":[193],"independent":[194],"number":[197],"messages.":[199],"evaluation":[201],"results":[202],"demonstrate":[203],"solution":[206],"is":[207],"efficient.":[210]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-30T00:00:00"}
