{"id":"https://openalex.org/W3094390539","doi":"https://doi.org/10.1109/jiot.2020.3033337","title":"Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks","display_name":"Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks","publication_year":2020,"publication_date":"2020-10-23","ids":{"openalex":"https://openalex.org/W3094390539","doi":"https://doi.org/10.1109/jiot.2020.3033337","mag":"3094390539"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3033337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3033337","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101846152","display_name":"Yu Zhan","orcid":"https://orcid.org/0000-0002-9148-6346"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhan","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053622471","display_name":"Baocang Wang","orcid":"https://orcid.org/0000-0002-2554-4464"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baocang Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks and the Crptographic Research Center, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101846152"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":3.7117,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.94378127,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"7","first_page":"5973","last_page":"5984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7930909395217896},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6224992275238037},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5927510857582092},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5502604246139526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5443732738494873},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4948093295097351},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4366396367549896},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42848560214042664},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42284393310546875},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14884597063064575},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09891563653945923}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7930909395217896},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6224992275238037},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5927510857582092},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5502604246139526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5443732738494873},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4948093295097351},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4366396367549896},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42848560214042664},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42284393310546875},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14884597063064575},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09891563653945923},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.3033337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3033337","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6605096260","display_name":null,"funder_award_id":"U19B2021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6811632461","display_name":null,"funder_award_id":"502210221150004","funder_id":"https://openalex.org/F4320323230","funder_display_name":"Xidian University"},{"id":"https://openalex.org/G7622220324","display_name":null,"funder_award_id":"U1736111","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8170696387","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323230","display_name":"Xidian University","ror":"https://ror.org/05s92vm98"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1490371707","https://openalex.org/W1552222267","https://openalex.org/W1591524234","https://openalex.org/W1788452017","https://openalex.org/W1805549252","https://openalex.org/W1967256467","https://openalex.org/W2003736153","https://openalex.org/W2012382733","https://openalex.org/W2012902875","https://openalex.org/W2033607738","https://openalex.org/W2035204644","https://openalex.org/W2036378739","https://openalex.org/W2075012519","https://openalex.org/W2105103777","https://openalex.org/W2108967892","https://openalex.org/W2120389871","https://openalex.org/W2168811559","https://openalex.org/W2169194339","https://openalex.org/W2231719474","https://openalex.org/W2399716882","https://openalex.org/W2526783369","https://openalex.org/W2753923799","https://openalex.org/W2768993938","https://openalex.org/W2787037790","https://openalex.org/W2794799331","https://openalex.org/W2794971392","https://openalex.org/W2808403644","https://openalex.org/W2905646440","https://openalex.org/W2908246778","https://openalex.org/W2911328135","https://openalex.org/W2928018723","https://openalex.org/W2948303289","https://openalex.org/W2955829994","https://openalex.org/W2969910737","https://openalex.org/W3011392375","https://openalex.org/W4246187791","https://openalex.org/W6633418448","https://openalex.org/W6651121328","https://openalex.org/W6712770142"],"related_works":["https://openalex.org/W2161209604","https://openalex.org/W1486255205","https://openalex.org/W3029593079","https://openalex.org/W2613410895","https://openalex.org/W1965775254","https://openalex.org/W2387773210","https://openalex.org/W2364255832","https://openalex.org/W2022961789","https://openalex.org/W2804479970","https://openalex.org/W2112914778"],"abstract_inverted_index":{"The":[0,180],"healthcare":[1,25,75],"wireless":[2],"medical":[3,13,32,39],"sensor":[4,33,102],"network":[5],"is":[6,164,188,234],"gradually":[7],"changing":[8],"the":[9,16,38,62,73,84,95,101,126,134,177,196,202,205,215,218,225,229],"traditional":[10],"mode":[11],"of":[12,19,21,52,88,97,136,148,204,217,220,231,242],"treatments":[14],"with":[15,104,214],"rapid":[17],"development":[18],"Internet":[20,147],"Things.":[22],"Specifically,":[23],"patients'":[24],"data":[26,76],"can":[27],"be":[28],"continuously":[29],"collected":[30],"by":[31,142,158],"nodes":[34,103],"and":[35,45,55,80,86,240],"transmitted":[36],"to":[37,49,71,92,175],"specialists":[40],"for":[41,100],"disease":[42],"monitoring,":[43],"diagnosis":[44],"treatments.":[46],"Recently,":[47],"due":[48],"its":[50],"advantages":[51],"low":[53],"computational":[54],"communication":[56,226],"overheads":[57],"in":[58,125,208],"a":[59,137],"multiuser":[60],"environment,":[61],"certificateless":[63],"aggregate":[64,206],"signature":[65,207],"(CLAS)":[66],"scheme":[67,140,163,174,187,233],"has":[68],"been":[69,114],"adopted":[70],"prevent":[72,119],"sensitive":[74],"from":[77,121],"being":[78,122],"tampered":[79],"damaged,":[81],"thereby":[82],"ensuring":[83],"integrity":[85],"authenticity":[87],"data.":[89],"In":[90,129,200],"order":[91],"further":[93],"improve":[94],"efficiency":[96,230],"CLAS":[98,108,139],"schemes":[99,109],"limited":[105],"resources,":[106],"several":[107],"without":[110],"bilinear":[111],"pairing":[112],"have":[113],"proposed.":[115],"However,":[116],"security":[117,135,178,181],"issues":[118],"them":[120],"fully":[123],"applied":[124],"practical":[127],"scenarios.":[128],"this":[130],"article,":[131],"we":[132,170],"analyze":[133],"pairing-free":[138],"proposed":[141],"Liu":[143],"et":[144],"al.":[145],"[IEEE":[146],"Things":[149],"Journal,":[150],"vol.":[151],"7,":[152],"no.":[153],"6,":[154],"pp.":[155],"5256-5266,":[156],"2020]":[157],"pointing":[159],"out":[160],"that":[161,184],"their":[162],"insecure":[165],"against":[166,191],"adversaries.":[167],"After":[168],"that,":[169],"introduce":[171],"an":[172],"improved":[173,186],"solve":[176],"vulnerability.":[179],"proofs":[182],"show":[183],"our":[185,209,232],"existentially":[189],"unforgeable":[190],"chosen":[192],"message":[193],"attacks":[194],"under":[195],"random":[197],"oracle":[198],"model.":[199],"addition,":[201],"length":[203],"proposal":[210],"does":[211],"not":[212],"increase":[213],"growth":[216],"number":[219],"users,":[221],"which":[222],"greatly":[223],"reduces":[224],"cost.":[227],"Finally,":[228],"illustrated":[235],"through":[236],"both":[237],"performance":[238],"analyses":[239],"comparisons":[241],"related":[243],"work.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
