{"id":"https://openalex.org/W4417131008","doi":"https://doi.org/10.1109/jiot.2025.3641397","title":"Blockchain-Assisted Efficient Certificateless Aggregate Signcryption Scheme for IoMT","display_name":"Blockchain-Assisted Efficient Certificateless Aggregate Signcryption Scheme for IoMT","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W4417131008","doi":"https://doi.org/10.1109/jiot.2025.3641397"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3641397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3641397","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039973378","display_name":"Gang Han","orcid":"https://orcid.org/0000-0002-2305-6870"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gang Han","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080447264","display_name":"Yan Ma","orcid":"https://orcid.org/0000-0002-7984-4796"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Ma","raw_affiliation_strings":["School of Cyberspace Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009338775","display_name":"Zhong-Liang Zhang","orcid":"https://orcid.org/0000-0001-6555-7908"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongliang Zhang","raw_affiliation_strings":["School of Management, Hangzhou Dianzi University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Hangzhou Dianzi University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108050448","display_name":"Jiajia Liu","orcid":"https://orcid.org/0000-0003-4273-8866"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Liu","raw_affiliation_strings":["National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, the School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","School of Cybersecurity, National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, the School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039973378"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21764811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"5","first_page":"8452","last_page":"8464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.6829000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.6829000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.1459999978542328,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.018200000748038292,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9544000029563904},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8758999705314636},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.6723999977111816},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6312999725341797},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5526000261306763},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5094000101089478},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4805000126361847},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4772999882698059},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.47519999742507935}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9544000029563904},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8758999705314636},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8136000037193298},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.6723999977111816},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6312999725341797},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5565000176429749},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5526000261306763},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5094000101089478},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4805000126361847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4772999882698059},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.47519999742507935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46880000829696655},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.445499986410141},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3937999904155731},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.38199999928474426},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3774000108242035},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3287999927997589},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.30660000443458557},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.2554999887943268},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.25519999861717224},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3641397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3641397","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,19,69,71,84,90,93,100,105,118,131],"challenges":[3],"of":[4,21,89,104],"weak":[5],"identity":[6,39,52,76],"binding":[7,53],"between":[8,54],"sensors":[9,55],"and":[10,56,65,78,87,102,110,122,141],"users,":[11],"as":[12,14],"well":[13],"insufficient":[15],"data":[16,67,80],"security":[17],"in":[18,117,136],"Internet":[20],"Medical":[22],"Things":[23],"(IoMT),":[24],"this":[25],"paper":[26],"proposes":[27],"a":[28],"blockchain-based":[29],"certificateless":[30],"aggregate":[31,42],"signcryption":[32,43],"scheme.":[33],"The":[34],"scheme":[35,106],"integrates":[36],"dynamic":[37],"anonymous":[38,61],"generation":[40],"with":[41],"techniques":[44],"to":[45],"achieve":[46],"lightweight":[47],"encryption":[48],"while":[49],"enhancing":[50],"protocol-level":[51],"device":[57],"users.":[58],"By":[59],"storing":[60],"identities,":[62],"public":[63],"keys,":[64],"signcrypted":[66],"on":[68,123],"blockchain,":[70],"proposed":[72,132],"approach":[73],"enables":[74],"verifiable":[75],"auditing":[77],"tamper-proof":[79],"preservation,":[81],"thereby":[82],"improving":[83],"overall":[85],"trustworthiness":[86],"traceability":[88],"system.":[91],"Under":[92],"random":[94],"oracle":[95],"model,":[96],"we":[97],"formally":[98],"prove":[99],"confidentiality":[101],"unforgeability":[103],"against":[107],"both":[108],"external":[109],"internal":[111],"adversaries.":[112],"Experimental":[113],"evaluations":[114],"are":[115],"conducted":[116],"Hyperledger":[119],"Fabric":[120],"environment":[121],"an":[124],"NVIDIA":[125],"Jetson":[126],"Nano":[127],"Developer":[128],"Kit,":[129],"demonstrating":[130],"scheme\u2019s":[133],"superior":[134],"performance":[135],"computation":[137],"efficiency,":[138],"communication":[139],"overhead,":[140],"practical":[142],"deployability.":[143]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-08T00:00:00"}
