{"id":"https://openalex.org/W2978245615","doi":"https://doi.org/10.1109/jiot.2019.2944632","title":"CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment","display_name":"CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2978245615","doi":"https://doi.org/10.1109/jiot.2019.2944632","mag":"2978245615"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2019.2944632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2944632","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088607627","display_name":"Girraj Kumar Verma","orcid":"https://orcid.org/0000-0001-8939-9203"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Girraj Kumar Verma","raw_affiliation_strings":["Amity School of Engineering and Technology, Amity University Madhya Pradesh, Gwalior, India"],"affiliations":[{"raw_affiliation_string":"Amity School of Engineering and Technology, Amity University Madhya Pradesh, Gwalior, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101516705","display_name":"Baljinder Singh","orcid":"https://orcid.org/0000-0002-6878-5196"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. B. Singh","raw_affiliation_strings":["Govt. K. R. G. (PG) College, Gwalior, India"],"affiliations":[{"raw_affiliation_string":"Govt. K. R. G. (PG) College, Gwalior, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]},{"id":"https://openalex.org/I4210111472","display_name":"King Abdul Aziz University Hospital","ror":"https://ror.org/01vv03303","country_code":"SA","type":"healthcare","lineage":["https://openalex.org/I4210111472"]}],"countries":["IN","SA"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["King Abdul Aziz University, Jeddah, Saudi Arabia","Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"King Abdul Aziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210111472"]},{"raw_affiliation_string":"Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005020243","display_name":"Vinay Chamola","orcid":"https://orcid.org/0000-0002-6730-3060"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vinay Chamola","raw_affiliation_strings":["BITS Pilani, Pilani, India"],"affiliations":[{"raw_affiliation_string":"BITS Pilani, Pilani, India","institution_ids":["https://openalex.org/I74796645"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088607627"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.3406,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.95539734,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"7","issue":"4","first_page":"2563","last_page":"2572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7588992714881897},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7505291700363159},{"id":"https://openalex.org/keywords/implicit-certificate","display_name":"Implicit certificate","score":0.6239585876464844},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.6030223965644836},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.5918181538581848},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5732253789901733},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.560339093208313},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5497477650642395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5416384935379028},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4516538381576538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4466087818145752},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.442655086517334},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4290286898612976},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3206079602241516},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2875567674636841},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1530536413192749},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11526548862457275},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.08483460545539856}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7588992714881897},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7505291700363159},{"id":"https://openalex.org/C67405866","wikidata":"https://www.wikidata.org/wiki/Q6007261","display_name":"Implicit certificate","level":5,"score":0.6239585876464844},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.6030223965644836},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.5918181538581848},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5732253789901733},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.560339093208313},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5497477650642395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5416384935379028},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4516538381576538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4466087818145752},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.442655086517334},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4290286898612976},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3206079602241516},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2875567674636841},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1530536413192749},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11526548862457275},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.08483460545539856},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2019.2944632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2944632","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1492257397","https://openalex.org/W1518480730","https://openalex.org/W1542057243","https://openalex.org/W1547928704","https://openalex.org/W1556480499","https://openalex.org/W1569083856","https://openalex.org/W1583791113","https://openalex.org/W1590902397","https://openalex.org/W1591524234","https://openalex.org/W1963552832","https://openalex.org/W2002101296","https://openalex.org/W2011534633","https://openalex.org/W2012902875","https://openalex.org/W2024310101","https://openalex.org/W2026531004","https://openalex.org/W2028239856","https://openalex.org/W2033607738","https://openalex.org/W2065955975","https://openalex.org/W2075763914","https://openalex.org/W2147753644","https://openalex.org/W2156186849","https://openalex.org/W2169194339","https://openalex.org/W2531800036","https://openalex.org/W2604898038","https://openalex.org/W2620994888","https://openalex.org/W2742211146","https://openalex.org/W2753923799","https://openalex.org/W2771643851","https://openalex.org/W2775456280","https://openalex.org/W2779721172","https://openalex.org/W2781759128","https://openalex.org/W2791462427","https://openalex.org/W2794799331","https://openalex.org/W2883035063","https://openalex.org/W2887067247","https://openalex.org/W2905646440","https://openalex.org/W2918475629","https://openalex.org/W2963550505","https://openalex.org/W2964973190","https://openalex.org/W6634010886"],"related_works":["https://openalex.org/W2383470191","https://openalex.org/W1993728727","https://openalex.org/W1980322260","https://openalex.org/W2188414276","https://openalex.org/W4313288832","https://openalex.org/W2109870474","https://openalex.org/W1566323499","https://openalex.org/W2079155879","https://openalex.org/W2365981401","https://openalex.org/W1969562429"],"abstract_inverted_index":{"The":[0,29,116],"notion":[1],"of":[2,4,9,45,50,53],"aggregation":[3,114],"data":[5,20],"in":[6,68,89,132],"Industrial":[7],"Internet":[8],"Things":[10],"(IIoT)":[11],"environment":[12],"is":[13,48,79,104,126],"a":[14,36],"common":[15],"practice.":[16],"It":[17],"shortens":[18],"the":[19,26,43,46,51,63,73,76,105,109,124,127,133],"and":[21,84,93,100,108,118],"associated":[22],"signatures":[23,56],"to":[24,57,72,130],"reduce":[25],"bandwidth":[27],"requirement.":[28],"compact":[30,99],"aggregate":[31,39],"signature":[32,40],"(CAS)":[33],"scheme":[34,67,78,125],"creates":[35],"constant":[37],"length":[38,44,117],"(AS).":[41],"Thus,":[42],"CAS":[47,66],"independent":[49],"number":[52],"messages":[54],"or":[55],"be":[58],"aggregated.":[59],"This":[60],"article":[61],"presents":[62],"first":[64],"pairing-free":[65],"certificate-based":[69,74],"settings.":[70],"Due":[71],"approach,":[75],"proposed":[77],"free":[80],"from":[81],"key":[82,85],"escrow":[83],"distribution":[86],"problems":[87],"inherited":[88],"identity-based":[90],"cryptography":[91,95],"(IDC)":[92],"certificate-less":[94],"(CLC),":[96],"respectively.":[97],"Being":[98],"pairing":[101],"free,":[102],"it":[103],"least":[106],"bandwidth-consuming":[107],"most":[110,128],"efficient":[111],"provably":[112],"secure":[113],"method.":[115],"computational":[119],"cost":[120],"analysis":[121],"show":[122],"that":[123],"appealing":[129],"use":[131],"IIoT":[134],"environment.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":12}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
