{"id":"https://openalex.org/W4377715488","doi":"https://doi.org/10.1109/jiot.2023.3279283","title":"ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments","display_name":"ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4377715488","doi":"https://doi.org/10.1109/jiot.2023.3279283"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3279283","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3279283","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068117437","display_name":"Houzhen Wang","orcid":"https://orcid.org/0000-0003-2773-5050"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Houzhen Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China","State Key Laboratory of Cryptology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2773-5050","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078320554","display_name":"Jiaming Wen","orcid":"https://orcid.org/0000-0002-0251-7105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Jiaming Wen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"raw_orcid":"https://orcid.org/0000-0002-0251-7105","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766363","display_name":"Jinhui Liu","orcid":"https://orcid.org/0000-0002-5665-026X"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhui Liu","raw_affiliation_strings":["School of Cyber Security, Northwestern Polytechnical University, Xi&#x2019;an, China","Research & Development Institute, Northwestern Polytechnical University, Shenzhen, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"Research & Development Institute, Northwestern Polytechnical University, Shenzhen, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026793623","display_name":"Huanguo Zhang","orcid":"https://orcid.org/0000-0001-5801-2897"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanguo Zhang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, and the School of Computer Science, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, and the School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068117437"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":2.0254,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89077791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"20","first_page":"18273","last_page":"18281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8514397144317627},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.7956692576408386},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5781967639923096},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5771374702453613},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5487204790115356},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5061444640159607},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.481190025806427},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.46742838621139526},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4666215181350708},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4350535273551941},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4221463203430176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3303431272506714},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2166224718093872},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12983813881874084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8514397144317627},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.7956692576408386},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5781967639923096},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5771374702453613},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5487204790115356},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5061444640159607},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.481190025806427},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.46742838621139526},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4666215181350708},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4350535273551941},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4221463203430176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3303431272506714},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2166224718093872},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12983813881874084},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2023.3279283","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3279283","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-15293","is_oa":false,"landing_page_url":"https://doi.org/10.1109/JIOT.2023.3279283","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Harvesting Series","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G2340924902","display_name":null,"funder_award_id":"20210317191843003","funder_id":"https://openalex.org/F4320329791","funder_display_name":"Shenzhen Fundamental Research Program"},{"id":"https://openalex.org/G2422588241","display_name":null,"funder_award_id":"62272389","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6605096260","display_name":null,"funder_award_id":"U19B2021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6822633694","display_name":null,"funder_award_id":"2022YFB4500800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7454804527","display_name":null,"funder_award_id":"62272385","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7975452587","display_name":null,"funder_award_id":"U20B2064","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329791","display_name":"Shenzhen Fundamental Research Program","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W154795652","https://openalex.org/W1484276943","https://openalex.org/W1517725369","https://openalex.org/W1548701190","https://openalex.org/W1561590459","https://openalex.org/W1571366390","https://openalex.org/W1575893707","https://openalex.org/W1599636498","https://openalex.org/W1751761265","https://openalex.org/W1880212920","https://openalex.org/W1968182591","https://openalex.org/W2096369004","https://openalex.org/W2107347355","https://openalex.org/W2108834246","https://openalex.org/W2114486350","https://openalex.org/W2120653360","https://openalex.org/W2133740767","https://openalex.org/W2142247058","https://openalex.org/W2146443249","https://openalex.org/W2153193245","https://openalex.org/W2156186849","https://openalex.org/W2230451675","https://openalex.org/W2270878789","https://openalex.org/W2284345771","https://openalex.org/W2304212389","https://openalex.org/W2568150523","https://openalex.org/W2810561002","https://openalex.org/W2899134616","https://openalex.org/W2902607665","https://openalex.org/W3017854325","https://openalex.org/W3021630508","https://openalex.org/W3026368930","https://openalex.org/W3091929063","https://openalex.org/W3132463100","https://openalex.org/W3166887093","https://openalex.org/W3203934452","https://openalex.org/W4232379679","https://openalex.org/W4233499556","https://openalex.org/W4254164763","https://openalex.org/W4280552546","https://openalex.org/W4313315809","https://openalex.org/W6630986860","https://openalex.org/W6634026138","https://openalex.org/W6636797535","https://openalex.org/W6674313084"],"related_works":["https://openalex.org/W1553510179","https://openalex.org/W2414747139","https://openalex.org/W1629274864","https://openalex.org/W1802397081","https://openalex.org/W2086770216","https://openalex.org/W807354026","https://openalex.org/W2157130609","https://openalex.org/W2077900604","https://openalex.org/W2100244348","https://openalex.org/W2123811836"],"abstract_inverted_index":{"Most":[0],"of":[1,13,18,47,124,137,151,155,164],"the":[2,31,44,48,55,65,68,72,77,98,104,121,134,179],"cryptographic":[3],"protocols":[4],"currently":[5],"in":[6,34,67,109,133,177,187],"use":[7],"are":[8,37],"not":[9],"appropriate":[10],"for":[11,24,129,184],"Internet":[12],"Things":[14],"(IoT)":[15],"environments":[16,36],"because":[17],"their":[19],"huge":[20],"computing":[21,32,45,74,92],"overhead,":[22],"especially":[23],"terminal-embedded":[25],"devices":[26,50],"with":[27],"resource":[28],"constrained.":[29],"Moreover,":[30],"resources":[33],"IoT":[35,147,188],"frequently":[38],"asymmetric,":[39],"that":[40,172],"is":[41,51,58,117,143],"to":[42,63,87,118],"say,":[43],"power":[46],"terminal":[49],"always":[52],"weak":[53],"and":[54,103,127,160],"server":[56],"side":[57],"relatively":[59],"stronger.":[60],"In":[61],"order":[62],"guarantee":[64],"security":[66],"scenario,":[69],"we":[70,84],"present":[71],"asymmetric":[73,91],"cryptosystem.":[75],"Take":[76],"key":[78,93,100],"exchange":[79,94,101],"protocol":[80,102,142,182],"as":[81],"an":[82,90,146],"example,":[83],"show":[85,171],"how":[86],"construct":[88],"ACKE,":[89],"protocol,":[95],"by":[96],"employing":[97],"Diffie\u2013Hellman":[99,180],"Subset":[105],"Product":[106],"problem":[107],"(NP-complete)":[108],"this":[110,115,173],"article.":[111],"The":[112,168],"underlying":[113],"idea":[114],"construction":[116],"significantly":[119],"decrease":[120],"computational":[122,135],"complexity":[123,136],"one":[125],"party,":[126],"allow":[128],"a":[130,152,161],"suitable":[131,183],"rise":[132],"another":[138],"party.":[139],"Our":[140],"proposed":[141],"implemented":[144],"on":[145],"simulation":[148],"platform":[149],"composed":[150],"notebook":[153],"PC":[154],"Intel":[156],"i5-5200U":[157],"2.2":[158],"GHz/8G":[159],"smart":[162],"watch":[163],"MTK6062":[165],"1.2":[166],"GHz/512M.":[167],"experimental":[169],"results":[170],"work":[174],"will":[175],"assist":[176],"making":[178],"type":[181],"practical":[185],"applications":[186],"environments.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
