{"id":"https://openalex.org/W4406137581","doi":"https://doi.org/10.1109/jiot.2025.3526724","title":"A Novel Approach to Cloud Security: Publicly Verifiable Remote Signcryption Framework","display_name":"A Novel Approach to Cloud Security: Publicly Verifiable Remote Signcryption Framework","publication_year":2025,"publication_date":"2025-01-07","ids":{"openalex":"https://openalex.org/W4406137581","doi":"https://doi.org/10.1109/jiot.2025.3526724"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3526724","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3526724","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8685-0991","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China","College of Computer and Data Science, Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"College of Computer and Data Science, Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051739014"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":2.9051,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87504959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"10","first_page":"14828","last_page":"14844"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9531000256538391,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9448000192642212,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.920803427696228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8516530394554138},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8219634294509888},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7860406637191772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6055824160575867},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4610893130302429},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3662341833114624},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2883833646774292},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.28790581226348877},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16242334246635437},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07765960693359375}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.920803427696228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8516530394554138},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8219634294509888},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7860406637191772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6055824160575867},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4610893130302429},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3662341833114624},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2883833646774292},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28790581226348877},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16242334246635437},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07765960693359375},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3526724","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3526724","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4910714274","display_name":null,"funder_award_id":"2021J06013","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G979158640","display_name":null,"funder_award_id":"62072109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W142078693","https://openalex.org/W1516634197","https://openalex.org/W1569083856","https://openalex.org/W1832688593","https://openalex.org/W2013849380","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2152924492","https://openalex.org/W2156186849","https://openalex.org/W2230451675","https://openalex.org/W2528685303","https://openalex.org/W2541793999","https://openalex.org/W2748568982","https://openalex.org/W2953030092","https://openalex.org/W2974805580","https://openalex.org/W3003594639","https://openalex.org/W3005884917","https://openalex.org/W3011989826","https://openalex.org/W3014625547","https://openalex.org/W3015739374","https://openalex.org/W3026474231","https://openalex.org/W3034487893","https://openalex.org/W3082110198","https://openalex.org/W3098526301","https://openalex.org/W3107240426","https://openalex.org/W3119451820","https://openalex.org/W3190854914","https://openalex.org/W3215536308","https://openalex.org/W4206770764","https://openalex.org/W4206908499","https://openalex.org/W4210425916","https://openalex.org/W4224250248","https://openalex.org/W4226177501","https://openalex.org/W4285049444","https://openalex.org/W4294311003","https://openalex.org/W4308391869","https://openalex.org/W4312922413","https://openalex.org/W4313055779","https://openalex.org/W4313598904","https://openalex.org/W4362654056","https://openalex.org/W4379116771","https://openalex.org/W4380716407","https://openalex.org/W4385300809","https://openalex.org/W4389160180","https://openalex.org/W4392028626","https://openalex.org/W4392405448","https://openalex.org/W4394585780","https://openalex.org/W4395109605","https://openalex.org/W4396941329","https://openalex.org/W4402449779"],"related_works":["https://openalex.org/W2464959902","https://openalex.org/W2766650597","https://openalex.org/W2355766212","https://openalex.org/W2351488919","https://openalex.org/W2166477497","https://openalex.org/W2022056704","https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790"],"abstract_inverted_index":{"In":[0],"communication":[1,161,178],"systems,":[2],"ensuring":[3],"both":[4,30],"data":[5,54,57,67,94,144,171,183],"integrity":[6,58],"and":[7,16,75,109,126,159],"confidentiality":[8],"is":[9],"crucial.":[10],"Traditional":[11],"methods,":[12,151],"such":[13],"as":[14],"encryption":[15],"signature":[17],"schemes,":[18],"handle":[19],"these":[20],"aspects":[21],"separately,":[22],"leading":[23],"to":[24,47,105,155,166,173],"inefficiencies.":[25],"Signcryption":[26],"techniques,":[27],"which":[28,192],"address":[29,106],"requirements":[31],"simultaneously,":[32],"present":[33],"a":[34,177,185],"more":[35],"efficient":[36],"alternative.":[37],"Nonetheless,":[38],"they":[39],"are":[40],"unsuitable":[41],"for":[42,53,90,124],"cloud":[43],"storage":[44],"systems":[45],"due":[46],"their":[48],"reliance":[49],"on":[50,131,142],"original":[51],"files":[52],"auditing.":[55],"Remote":[56],"checking":[59],"(RDIC)":[60],"methods":[61,87],"resolve":[62],"this":[63,107],"issue":[64],"but":[65],"compromise":[66],"confidentiality.":[68],"To":[69],"bridge":[70],"the":[71,111,121,132,135],"gap":[72],"between":[73],"signcryption":[74,79,103,190],"RDIC":[76,167],"approaches,":[77,191],"remote":[78,102],"(RSC)":[80],"has":[81],"been":[82],"proposed.":[83],"However,":[84],"existing":[85,150],"RSC":[86],"lack":[88],"support":[89],"public":[91,117],"auditing,":[92],"rendering":[93],"auditing":[95],"non-outsourcable.":[96],"This":[97],"paper":[98],"introduces":[99],"publicly":[100],"verifiable":[101],"(PVRSC)":[104],"shortcoming":[108],"presents":[110],"first":[112],"concrete":[113],"PVRSC":[114,125,147,175],"scheme":[115],"with":[116],"verifiability.":[118],"We":[119],"define":[120],"security":[122],"model":[123],"prove":[127],"its":[128],"robustness":[129],"based":[130],"hardness":[133],"of":[134],"Bilinear":[136],"Diffie-Hellman":[137],"(BDH)":[138],"problem.":[139],"Our":[140],"implementation":[141],"real":[143],"shows":[145],"that":[146],"significantly":[148],"outperforms":[149],"achieving":[152],"speeds":[153],"up":[154,172],"100":[156],"times":[157],"faster":[158],"reducing":[160],"costs":[162],"by":[163],"half":[164],"compared":[165],"methods.":[168],"For":[169],"outsourced":[170],"5MB,":[174],"maintains":[176],"cost":[179],"below":[180],"8KB":[181],"during":[182],"recovery,":[184],"substantial":[186],"improvement":[187],"over":[188],"classical":[189],"exceed":[193],"5MB.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
