{"id":"https://openalex.org/W3011175887","doi":"https://doi.org/10.1109/jsyst.2020.2974892","title":"Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks","display_name":"Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks","publication_year":2020,"publication_date":"2020-03-09","ids":{"openalex":"https://openalex.org/W3011175887","doi":"https://doi.org/10.1109/jsyst.2020.2974892","mag":"3011175887"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2020.2974892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2974892","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100725640","display_name":"Yudi Zhang","orcid":"https://orcid.org/0000-0002-7830-5133"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yudi Zhang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China","Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614493","display_name":"Yumei Li","orcid":"https://orcid.org/0000-0002-0591-5061"},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yumei Li","raw_affiliation_strings":["School of Mathematical Sciences, Nanjing Normal University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Nanjing Normal University, Nanjing, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077290356","display_name":"Mingwu Zhang","orcid":"https://orcid.org/0000-0001-8551-8826"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwu Zhang","raw_affiliation_strings":["Computer School, Hubei University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Computer School, Hubei University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100725640"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":1.0605,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.81568868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"14","issue":"4","first_page":"5320","last_page":"5328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7570689916610718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6480934023857117},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6401065587997437},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5187142491340637},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.514306902885437},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4180227816104889},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4055020809173584},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09020695090293884}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7570689916610718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6480934023857117},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6401065587997437},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5187142491340637},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.514306902885437},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4180227816104889},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4055020809173584},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09020695090293884}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2020.2974892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2974892","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3371617097","display_name":null,"funder_award_id":"2017CFA007","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6609979484","display_name":null,"funder_award_id":"61672010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W192760154","https://openalex.org/W1461455889","https://openalex.org/W1509316335","https://openalex.org/W1554705736","https://openalex.org/W1567827377","https://openalex.org/W1577917216","https://openalex.org/W1832688593","https://openalex.org/W1964143653","https://openalex.org/W1977411270","https://openalex.org/W1986771771","https://openalex.org/W1993951626","https://openalex.org/W1996912680","https://openalex.org/W2053368181","https://openalex.org/W2055335386","https://openalex.org/W2103056119","https://openalex.org/W2130851966","https://openalex.org/W2136012769","https://openalex.org/W2139910984","https://openalex.org/W2148888468","https://openalex.org/W2172174332","https://openalex.org/W2252576427","https://openalex.org/W2263562411","https://openalex.org/W2400178274","https://openalex.org/W2506204729","https://openalex.org/W2552699189","https://openalex.org/W2586923239","https://openalex.org/W2594028680","https://openalex.org/W2599557761","https://openalex.org/W2793423901","https://openalex.org/W2886379314","https://openalex.org/W2888378760","https://openalex.org/W2921721648","https://openalex.org/W2960809202","https://openalex.org/W3000040791","https://openalex.org/W3112881776","https://openalex.org/W4212889850","https://openalex.org/W6648678412","https://openalex.org/W6691126936","https://openalex.org/W6693027903","https://openalex.org/W6787727849"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2596984206","https://openalex.org/W1507511632"],"abstract_inverted_index":{"The":[0,26,165],"rapid":[1],"development":[2],"of":[3,6,13,45,53,76,105,135,170],"the":[4,11,41,69,77,103,122,127,133,142,153,168],"Internet":[5],"Things":[7],"has":[8],"contributed":[9],"to":[10,39,68,108],"emergence":[12],"novel":[14],"applications":[15],"in":[16,58,83,95,126,173],"recent":[17],"years,":[18],"such":[19],"as":[20],"wireless":[21],"body":[22],"area":[23],"networks":[24],"(WBANs).":[25],"latter":[27],"can":[28,98],"potentially":[29],"provide":[30],"people":[31],"with":[32],"convenience":[33],"and":[34,43,73,100,110,138,161],"high-quality":[35],"healthcare.":[36],"However,":[37],"how":[38],"protect":[40],"confidentiality":[42],"privacy":[44],"user":[46],"data":[47,112],"remains":[48],"challenging.":[49],"Although":[50],"a":[51,159],"number":[52],"schemes":[54],"using":[55,152],"cryptographic":[56],"tools":[57],"WBANs":[59],"have":[60],"been":[61],"proposed,":[62],"they":[63],"are":[64],"not":[65],"practical":[66],"due":[67],"low":[70],"computing":[71],"power":[72],"storage":[74],"capabilities":[75],"sensors.":[78,115],"To":[79],"remedy":[80],"this":[81,84],"shortcoming,":[82],"article,":[85],"we":[86,148],"propose":[87],"an":[88,162],"efficient":[89],"obfuscation":[90],"for":[91],"encrypted":[92],"identity-based":[93,123],"signatures":[94],"WBANs,":[96],"which":[97],"securely":[99],"efficiently":[101],"use":[102],"resources":[104],"mobile":[106],"devices":[107],"sign":[109],"encrypt":[111],"collected":[113],"by":[114],"In":[116],"particular,":[117],"our":[118,136,150,171],"proposed":[119],"scheme":[120,125,151,172],"employs":[121],"signature":[124],"IEEE":[128],"P1363":[129],"standard.":[130],"We":[131],"prove":[132],"security":[134],"scheme,":[137],"that":[139],"it":[140],"satisfies":[141],"virtual":[143],"black":[144],"box":[145],"properties.":[146],"Moreover,":[147],"implement":[149],"Java":[154],"pairing-based":[155],"cryptography":[156],"library":[157],"on":[158],"laptop":[160],"Android":[163],"phone.":[164],"experimental":[166],"results":[167],"utility":[169],"WBANs.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
