{"id":"https://openalex.org/W4390887491","doi":"https://doi.org/10.1109/jiot.2024.3353807","title":"Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices","display_name":"Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices","publication_year":2024,"publication_date":"2024-01-15","ids":{"openalex":"https://openalex.org/W4390887491","doi":"https://doi.org/10.1109/jiot.2024.3353807"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3353807","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3353807","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103213076","display_name":"Pengbo Xu","orcid":"https://orcid.org/0009-0008-9399-4329"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengbo Xu","raw_affiliation_strings":["National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001829510","display_name":"Huici Wu","orcid":"https://orcid.org/0000-0001-7689-482X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huici Wu","raw_affiliation_strings":["National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","PengCheng Lab, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"PengCheng Lab, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100624765","display_name":"Xiaofeng Tao","orcid":"https://orcid.org/0000-0001-9518-1622"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Tao","raw_affiliation_strings":["National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","PengCheng Lab, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"PengCheng Lab, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100385875","display_name":"Chenyu Wang","orcid":"https://orcid.org/0000-0002-6527-2897"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Wang","raw_affiliation_strings":["National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073181706","display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020360628","display_name":"Guoshun Nan","orcid":"https://orcid.org/0000-0002-1987-2736"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoshun Nan","raw_affiliation_strings":["National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103213076"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":4.8234,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95336474,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"9","first_page":"16561","last_page":"16577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8055657148361206},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5544376969337463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48578718304634094},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.45088067650794983},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44935277104377747},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4374111294746399},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4369671642780304},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4341721832752228},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4334167540073395},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41016966104507446}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8055657148361206},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5544376969337463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48578718304634094},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.45088067650794983},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44935277104377747},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4374111294746399},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4369671642780304},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4341721832752228},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4334167540073395},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41016966104507446}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3353807","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3353807","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1010105751","display_name":null,"funder_award_id":"61932005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2704826626","display_name":null,"funder_award_id":"62271076","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7568062542","display_name":null,"funder_award_id":"62002047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W62933689","https://openalex.org/W121367636","https://openalex.org/W1513904472","https://openalex.org/W1761303171","https://openalex.org/W1801505325","https://openalex.org/W1936753088","https://openalex.org/W1968979302","https://openalex.org/W2029693536","https://openalex.org/W2038761522","https://openalex.org/W2042923641","https://openalex.org/W2152924492","https://openalex.org/W2293449522","https://openalex.org/W2794194229","https://openalex.org/W2809727329","https://openalex.org/W2899185760","https://openalex.org/W2914654142","https://openalex.org/W2944879713","https://openalex.org/W2965343532","https://openalex.org/W2976577124","https://openalex.org/W3002159761","https://openalex.org/W3003651800","https://openalex.org/W3043271373","https://openalex.org/W3115741206","https://openalex.org/W3126175143","https://openalex.org/W3127490805","https://openalex.org/W3131865408","https://openalex.org/W3133340445","https://openalex.org/W3137615531","https://openalex.org/W3190147478","https://openalex.org/W3206934513","https://openalex.org/W4205745215","https://openalex.org/W4283018758","https://openalex.org/W4294811380","https://openalex.org/W4294862393","https://openalex.org/W4315629892","https://openalex.org/W4376138301","https://openalex.org/W6797027906"],"related_works":["https://openalex.org/W2140125353","https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050","https://openalex.org/W3201780008","https://openalex.org/W2043851470"],"abstract_inverted_index":{"Internet":[0],"of":[1,6,21,41,94,105,115,121,127,163,184,202,208],"Things":[2],"(IoT)":[3],"is":[4,167,174,218],"one":[5],"the":[7,13,35,39,58,62,103,112,119,125,164,170,177,182,200,203],"most":[8],"representative":[9],"application":[10],"scenarios":[11],"in":[12,155,206],"5G":[14],"and":[15,30,66,84,190,215],"6G":[16],"era.":[17],"The":[18,98,130],"concurrent":[19,64,95],"access":[20],"massive":[22,63],"IoT":[23],"devices":[24],"definitely":[25],"poses":[26],"enormous":[27],"communication,":[28],"computation,":[29],"certificate":[31,108],"management":[32],"challenges":[33,59],"to":[34,54,90,152],"wireless":[36],"authentication.":[37],"Moreover,":[38,118],"emergence":[40],"quantum":[42,67,128],"computing":[43],"makes":[44],"classical":[45],"cryptography-based":[46],"authentication":[47,65,77,93,100],"protocols,":[48],"such":[49,140],"as":[50,141],"5G-AKA,":[51],"more":[52,150],"easier":[53],"be":[55,153],"broken.":[56],"Facing":[57],"posed":[60],"by":[61],"attacks,":[68],"this":[69],"paper":[70],"proposes":[71],"a":[72],"lattice":[73,122],"cryptography":[74,123],"based":[75],"group":[76,146],"scheme,":[78],"where":[79],"lattice-based":[80],"aggregate":[81],"signature":[82],"algorithm":[83],"identity-based":[85],"encryption":[86],"(IBE)":[87],"are":[88],"leveraged":[89],"achieve":[91],"simultaneous":[92],"accessed":[96],"devices.":[97],"proposed":[99,131,165,178,204],"scheme":[101,205],"eliminates":[102],"process":[104],"public":[106],"key":[107],"management,":[109],"greatly":[110],"reducing":[111],"storage":[113],"overhead":[114],"core":[116],"network.":[117],"utilization":[120],"enables":[124],"resistance":[126],"attacks.":[129],"solution":[132],"does":[133],"not":[134],"rely":[135],"on":[136],"additional":[137],"security":[138,142,161,216],"assumptions":[139],"channel":[143],"or":[144],"trusted":[145],"center,":[147],"making":[148],"it":[149],"flexible":[151],"deployed":[154],"actual":[156],"network":[157],"scenario.":[158],"Finally,":[159],"formal":[160],"analysis":[162],"protocol":[166,179],"provided":[168],"with":[169,196,220],"tool":[171],"ProVerif.":[172],"It":[173],"demonstrated":[175],"that":[176],"can":[180],"satisfy":[181],"goals":[183],"identity":[185],"privacy,":[186],"authentication,":[187],"data":[188],"confidentiality":[189],"forward":[191],"secrecy.":[192],"In":[193],"addition,":[194],"compared":[195],"existing":[197],"advanced":[198],"solutions,":[199],"outperformance":[201],"terms":[207],"computation":[209],"overhead,":[210,212,214],"signaling":[211],"communication":[213],"properties":[217],"validated":[219],"simulations.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
