{"id":"https://openalex.org/W2970759288","doi":"https://doi.org/10.1109/jsyst.2019.2935998","title":"Anonymous Aggregate Encryption Scheme for Industrial Internet of Things","display_name":"Anonymous Aggregate Encryption Scheme for Industrial Internet of Things","publication_year":2019,"publication_date":"2019-08-28","ids":{"openalex":"https://openalex.org/W2970759288","doi":"https://doi.org/10.1109/jsyst.2019.2935998","mag":"2970759288"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2019.2935998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2935998","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042776527","display_name":"Lunzhi Deng","orcid":"https://orcid.org/0000-0002-9688-1062"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lunzhi Deng","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5042776527"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":null,"apc_paid":null,"fwci":0.5788,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.75902963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"3","first_page":"3999","last_page":"4006"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.752307653427124},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7068212628364563},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6885348558425903},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.67738938331604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6582585573196411},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.586194634437561},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5800528526306152},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48807036876678467},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4849588871002197},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44318971037864685},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4126787781715393},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09253525733947754},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0771183967590332}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.752307653427124},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7068212628364563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6885348558425903},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.67738938331604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6582585573196411},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.586194634437561},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5800528526306152},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48807036876678467},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4849588871002197},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44318971037864685},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4126787781715393},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09253525733947754},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0771183967590332},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2019.2935998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2935998","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1364004350","display_name":null,"funder_award_id":"61562012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5677104735","display_name":null,"funder_award_id":"KY[2016]026","funder_id":"https://openalex.org/F4320326674","funder_display_name":"Department of Education of Guizhou Province"},{"id":"https://openalex.org/G8425086980","display_name":null,"funder_award_id":"61962011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326674","display_name":"Department of Education of Guizhou Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W117480120","https://openalex.org/W1539731298","https://openalex.org/W1569083856","https://openalex.org/W1577385971","https://openalex.org/W1592092778","https://openalex.org/W1600062492","https://openalex.org/W1787766190","https://openalex.org/W1889467935","https://openalex.org/W1935937957","https://openalex.org/W1986037613","https://openalex.org/W1995296332","https://openalex.org/W2001724098","https://openalex.org/W2009023744","https://openalex.org/W2020227227","https://openalex.org/W2048576441","https://openalex.org/W2053797511","https://openalex.org/W2055481645","https://openalex.org/W2063447977","https://openalex.org/W2064519210","https://openalex.org/W2065798236","https://openalex.org/W2077268166","https://openalex.org/W2089942155","https://openalex.org/W2090838920","https://openalex.org/W2092328711","https://openalex.org/W2097489266","https://openalex.org/W2114359803","https://openalex.org/W2114791175","https://openalex.org/W2118421157","https://openalex.org/W2137807850","https://openalex.org/W2138018104","https://openalex.org/W2143205946","https://openalex.org/W2264052247","https://openalex.org/W2395094708","https://openalex.org/W2409528574","https://openalex.org/W2467562378","https://openalex.org/W2527643033","https://openalex.org/W2567272551","https://openalex.org/W2567642374","https://openalex.org/W2593472119","https://openalex.org/W2601755223","https://openalex.org/W2610394900","https://openalex.org/W2613814461","https://openalex.org/W2736092169","https://openalex.org/W2759215600","https://openalex.org/W2767329275","https://openalex.org/W2767713621","https://openalex.org/W2784296252","https://openalex.org/W2794013960","https://openalex.org/W2800664508","https://openalex.org/W2808325525","https://openalex.org/W2884765758","https://openalex.org/W2911261396","https://openalex.org/W6634452052","https://openalex.org/W6635412825","https://openalex.org/W6638076110","https://openalex.org/W6666603888","https://openalex.org/W6674397926","https://openalex.org/W6711579915","https://openalex.org/W6731126658","https://openalex.org/W6737206246"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"With":[0],"the":[1,8,19,32,61,73,79,89,98,100,103,111,123,126,150,155],"rapid":[2],"development":[3],"of":[4,11,21,24,37,63,78,92,125],"information":[5],"technology":[6],"and":[7,17,50,122,175],"continuous":[9],"upgrading":[10],"special":[12],"equipment,":[13],"such":[14],"as":[15],"sensing":[16],"control,":[18],"application":[20],"industrial":[22],"Internet":[23],"Things":[25],"(IIoTs)":[26],"has":[27,53],"received":[28],"great":[29],"attention.":[30],"Within":[31],"IIoTs,":[33],"a":[34,55],"large":[35],"amount":[36],"sensitive":[38],"data":[39,48],"needs":[40],"to":[41,109,131,146],"be":[42,147],"transmitted":[43],"in":[44,149],"time.":[45,75],"Therefore,":[46],"protecting":[47],"security":[49],"user":[51],"privacy":[52],"been":[54],"key":[56,65,108],"issue.":[57],"In":[58],"this":[59],"article,":[60],"concept":[62],"public":[64,90,172],"anonymous":[66],"aggregation":[67],"encryption":[68,173],"(AAE)":[69],"is":[70,128,141,144,167,176],"proposed":[71],"for":[72,179],"first":[74],"The":[76,114],"sender":[77],"message":[80],"encrypts":[81],"n":[82,93],"different":[83,94,118],"messages":[84,115],"into":[85],"one":[86],"ciphertext":[87,104],"using":[88,105],"keys":[91],"receivers.":[95,135],"After":[96],"receiving":[97],"ciphertext,":[99],"receiver":[101,127],"decrypts":[102],"his":[106],"private":[107],"get":[110],"corresponding":[112],"message.":[113],"obtained":[116],"by":[117],"receivers":[119],"are":[120],"different,":[121],"identity":[124],"kept":[129],"secret":[130],"anyone":[132],"including":[133],"other":[134],"A":[136],"concrete":[137],"AAE":[138],"scheme":[139],"then":[140],"constructed,":[142],"which":[143],"proved":[145],"secure":[148],"standard":[151],"model":[152],"based":[153],"on":[154],"decisional":[156],"Diffie-Hellman":[157],"problem.":[158],"It":[159],"does":[160],"not":[161],"require":[162],"pairing":[163],"operations,":[164],"so":[165],"it":[166],"more":[168,177],"efficient":[169],"than":[170],"previous":[171],"schemes":[174],"suitable":[178],"IIoTs.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
