{"id":"https://openalex.org/W4402449779","doi":"https://doi.org/10.1109/jiot.2024.3457988","title":"A Novel Framework in Cloud Security: Remote Signcryption","display_name":"A Novel Framework in Cloud Security: Remote Signcryption","publication_year":2024,"publication_date":"2024-09-11","ids":{"openalex":"https://openalex.org/W4402449779","doi":"https://doi.org/10.1109/jiot.2024.3457988"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3457988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3457988","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8685-0991","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051739014"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":1.9868,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88441995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"11","issue":"24","first_page":"41207","last_page":"41222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.899120032787323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7992181777954102},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6960462927818298},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4882400333881378},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.47175341844558716},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3875907361507416},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3507205843925476},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.31435465812683105},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20702755451202393},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1309225857257843}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.899120032787323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7992181777954102},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6960462927818298},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4882400333881378},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.47175341844558716},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3875907361507416},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3507205843925476},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.31435465812683105},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20702755451202393},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1309225857257843}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3457988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3457988","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4910714274","display_name":null,"funder_award_id":"2021J06013","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G979158640","display_name":null,"funder_award_id":"62072109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W142078693","https://openalex.org/W1516634197","https://openalex.org/W1569083856","https://openalex.org/W1591524234","https://openalex.org/W1724472458","https://openalex.org/W1832688593","https://openalex.org/W2013849380","https://openalex.org/W2040193872","https://openalex.org/W2069667482","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2152924492","https://openalex.org/W2156186849","https://openalex.org/W2528685303","https://openalex.org/W2541793999","https://openalex.org/W2748568982","https://openalex.org/W2974805580","https://openalex.org/W3003286954","https://openalex.org/W3003594639","https://openalex.org/W3005884917","https://openalex.org/W3007918540","https://openalex.org/W3011989826","https://openalex.org/W3014625547","https://openalex.org/W3015739374","https://openalex.org/W3021104834","https://openalex.org/W3025429504","https://openalex.org/W3026474231","https://openalex.org/W3030964839","https://openalex.org/W3034487893","https://openalex.org/W3107240426","https://openalex.org/W3119451820","https://openalex.org/W3215536308","https://openalex.org/W4206770764","https://openalex.org/W4206908499","https://openalex.org/W4210425916","https://openalex.org/W4224250248","https://openalex.org/W4226177501","https://openalex.org/W4285049444","https://openalex.org/W4294311003","https://openalex.org/W4312922413","https://openalex.org/W4313598904","https://openalex.org/W4323644325","https://openalex.org/W4362563552","https://openalex.org/W4362654056","https://openalex.org/W4368232810","https://openalex.org/W4376481172","https://openalex.org/W4380716407","https://openalex.org/W4385300809","https://openalex.org/W4385453049","https://openalex.org/W4386322364","https://openalex.org/W4392405448","https://openalex.org/W4392523464","https://openalex.org/W4394585780","https://openalex.org/W4396941329","https://openalex.org/W4400188287","https://openalex.org/W4400526151","https://openalex.org/W4400770835","https://openalex.org/W6778619023"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W4401658540"],"abstract_inverted_index":{"Ensuring":[0],"data":[1,34,48,52,128,174],"integrity":[2,53],"and":[3,16,79,111,147],"confidentiality":[4],"is":[5],"critical":[6],"in":[7,71,94],"communication":[8,149,168],"systems.":[9],"Traditional":[10],"methods,":[11,141],"such":[12],"as":[13],"separate":[14],"encryption":[15],"signature":[17],"schemes,":[18],"often":[19],"lead":[20],"to":[21,41,154],"inefficiencies.":[22],"While":[23],"signcryption":[24,77,181],"methods":[25,56,182],"address":[26],"both":[27],"needs":[28],"simultaneously,":[29],"they":[30],"are":[31],"inadequate":[32],"for":[33,44,60,107],"outsourcing":[35],"systems":[36],"like":[37],"cloud":[38,72],"computing":[39],"due":[40],"the":[42,58,69,81,88,105,116,167],"requirement":[43],"original":[45,61],"files":[46,62],"during":[47,173],"verification.":[49],"Conversely,":[50],"remote":[51,76],"checking":[54],"(RDIC)":[55],"eliminate":[57],"need":[59],"but":[63],"lack":[64],"confidentiality.":[65],"This":[66],"article":[67],"fills":[68],"gap":[70],"security":[73,106,114],"by":[74,151],"introducing":[75],"(RSC)":[78],"presenting":[80],"first":[82],"concrete":[83],"RSC":[84,109,137,165],"scheme.":[85],"We":[86],"demonstrate":[87],"application":[89],"of":[90,97,162],"this":[91],"novel":[92],"approach":[93],"cloud-assisted":[95],"Internet":[96],"Things":[98],"(IoT)":[99],"networks.":[100],"Our":[101],"work":[102],"includes":[103],"defining":[104],"an":[108],"scheme":[110,125],"proving":[112],"its":[113],"under":[115,170],"bilinear":[117],"Diffie-Hellman":[118],"(BDH)":[119],"hardness":[120],"assumption.":[121],"Implementing":[122],"our":[123],"proposed":[124],"on":[126],"real":[127],"from":[129],"trending":[130],"YouTube":[131],"video":[132],"statistics,":[133],"we":[134],"found":[135],"that":[136,183],"significantly":[138],"outperforms":[139],"existing":[140],"achieving":[142],"100":[143],"times":[144],"faster":[145],"speed":[146],"reducing":[148],"costs":[150],"half":[152],"compared":[153],"RDIC":[155],"methods.":[156],"Notably,":[157],"even":[158],"with":[159],"5":[160,186],"MB":[161],"outsourced":[163],"data,":[164],"keeps":[166],"cost":[169],"8":[171],"kB":[172],"recovery,":[175],"a":[176],"substantial":[177],"improvement":[178],"over":[179,185],"classical":[180],"require":[184],"MB.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
