{"id":"https://openalex.org/W4417284279","doi":"https://doi.org/10.1109/jiot.2025.3643472","title":"Practical Certificateless Aggregate Signcryption With Public Verification for IoMT","display_name":"Practical Certificateless Aggregate Signcryption With Public Verification for IoMT","publication_year":2025,"publication_date":"2025-12-12","ids":{"openalex":"https://openalex.org/W4417284279","doi":"https://doi.org/10.1109/jiot.2025.3643472"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3643472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3643472","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079796721","display_name":"Wenjie Yang","orcid":"https://orcid.org/0000-0002-5326-5382"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenjie Yang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455282","display_name":"Tao Li","orcid":"https://orcid.org/0000-0002-1448-3619"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027615941","display_name":"Futai Zhang","orcid":"https://orcid.org/0000-0001-8984-1030"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Futai Zhang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100294995","display_name":"Yun Zheng","orcid":"https://orcid.org/0009-0003-5520-5716"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Zheng","raw_affiliation_strings":["College of Photonic and Electronic Engineering, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Photonic and Electronic Engineering, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079796721"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20872654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"5266","last_page":"5278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8147000074386597,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8147000074386597,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.07400000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.018300000578165054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9484999775886536},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7081999778747559},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.6586999893188477},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5778999924659729},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5756000280380249},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5148000121116638},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.4796999990940094},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4390000104904175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4237000048160553},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.40220001339912415},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.4016999900341034}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9484999775886536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925999760627747},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7081999778747559},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.6586999893188477},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5778999924659729},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5756000280380249},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5148000121116638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5123999714851379},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.4796999990940094},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4390000104904175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4237000048160553},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.40220001339912415},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4016999900341034},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4007999897003174},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3919000029563904},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37380000948905945},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3662000000476837},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.3237999975681305},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3181999921798706},{"id":"https://openalex.org/C67405866","wikidata":"https://www.wikidata.org/wiki/Q6007261","display_name":"Implicit certificate","level":5,"score":0.3167000114917755},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.31220000982284546},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31200000643730164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.30219998955726624},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.3000999987125397},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.290800005197525},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.28999999165534973},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.2847000062465668},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27950000762939453},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.27480000257492065},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2685000002384186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3643472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3643472","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2249602513","display_name":null,"funder_award_id":"62172096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8350028396","display_name":null,"funder_award_id":"62202101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1516634197","https://openalex.org/W1591524234","https://openalex.org/W2009637449","https://openalex.org/W2040840104","https://openalex.org/W2040987689","https://openalex.org/W2157285143","https://openalex.org/W2296328808","https://openalex.org/W2961087419","https://openalex.org/W3021142102","https://openalex.org/W3028585428","https://openalex.org/W3184869417","https://openalex.org/W3188903343","https://openalex.org/W4206770764","https://openalex.org/W4212974603","https://openalex.org/W4312602835","https://openalex.org/W4313055779","https://openalex.org/W4313307834","https://openalex.org/W4385259829","https://openalex.org/W4387934935","https://openalex.org/W4388015999","https://openalex.org/W4388830376","https://openalex.org/W4390970385","https://openalex.org/W4392450239","https://openalex.org/W4396941329","https://openalex.org/W4402765782","https://openalex.org/W4405517714","https://openalex.org/W4406108670","https://openalex.org/W4406258991","https://openalex.org/W4406286585","https://openalex.org/W4408227492","https://openalex.org/W4410769877","https://openalex.org/W4411055267","https://openalex.org/W4412972007"],"related_works":[],"abstract_inverted_index":{"In":[0,62],"the":[1,8,85,100,126,136,156,159,165],"Internet":[2],"of":[3,13,102,139,158],"Medical":[4],"Things":[5],"(IoMT),":[6],"ensuring":[7],"confidentiality,":[9],"integrity,":[10],"and":[11,25,83,105,121,128,151,164,190],"authenticity":[12],"sensitive":[14],"medical":[15],"data":[16],"poses":[17],"a":[18,33,67,115],"significant":[19],"challenge.":[20],"Signcryption,":[21],"merging":[22],"digital":[23],"signature":[24],"public-key":[26],"encryption":[27],"into":[28,114],"one":[29],"logical":[30],"step,":[31],"offers":[32],"promising":[34],"solution":[35],"for":[36,76,148],"such":[37],"resource-constrained":[38,193],"networks.":[39],"Most":[40],"existing":[41],"signcryption":[42,71],"schemes":[43],"inherently":[44],"lack":[45],"public":[46,74,132],"verification,":[47,133],"which":[48],"prevents":[49],"third":[50],"parties":[51],"(such":[52],"as":[53],"routers)":[54],"from":[55],"early":[56,137],"identifying":[57],"illegal":[58,140,184],"messages":[59],"without":[60],"decryption.":[61],"this":[63,180],"paper,":[64],"we":[65],"propose":[66],"practical":[68],"certificateless":[69,86],"aggregate":[70,117],"scheme":[72,181],"with":[73,177],"verification":[75],"IoMT.":[77,194],"Our":[78],"design":[79],"uses":[80],"elliptic":[81,166],"curves":[82],"follows":[84],"cryptosystem":[87],"framework.":[88],"Thus,":[89],"it":[90],"not":[91],"only":[92],"avoids":[93],"time-consuming":[94],"pairing":[95],"operations":[96],"but":[97],"also":[98],"addresses":[99],"issues":[101],"certificate":[103],"management":[104],"key":[106],"escrow.":[107],"Meanwhile,":[108],"individual":[109],"signcryptions":[110,130],"can":[111],"be":[112],"compressed":[113],"single":[116],"signcryption,":[118],"optimizing":[119],"computational":[120],"communication":[122],"overheads.":[123],"Furthermore,":[124],"both":[125],"pre-aggregated":[127],"aggregated":[129],"support":[131],"effectively":[134],"enabling":[135],"elimination":[138],"messages.":[141],"We":[142],"further":[143],"present":[144],"formal":[145],"security":[146,154],"proofs":[147],"our":[149],"construction":[150],"reduce":[152],"its":[153],"to":[155],"hardness":[157],"one-sided":[160],"gap":[161],"Diffie-Hellman":[162],"(OGDH)":[163],"curve":[167],"discrete":[168],"logarithm":[169],"(ECDL)":[170],"problems.":[171],"Performance":[172],"analysis":[173],"reveals":[174],"that,":[175],"compared":[176],"prior":[178],"studies,":[179],"preemptively":[182],"blocks":[183],"message":[185],"spread,":[186],"reduces":[187],"receiving-end":[188],"load,":[189],"better":[191],"suits":[192]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-12T00:00:00"}
