{"id":"https://openalex.org/W4386088264","doi":"https://doi.org/10.1109/tce.2023.3307697","title":"Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics","display_name":"Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics","publication_year":2023,"publication_date":"2023-08-23","ids":{"openalex":"https://openalex.org/W4386088264","doi":"https://doi.org/10.1109/tce.2023.3307697"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2023.3307697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2023.3307697","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057013630","display_name":"Haoyang An","orcid":"https://orcid.org/0000-0002-1510-7914"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyang An","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043346874","display_name":"Cong Peng","orcid":"https://orcid.org/0000-0002-9958-3255"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Peng","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005738289","display_name":"Lianhai Wang","orcid":"https://orcid.org/0000-0002-5701-3465"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianhai Wang","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057013630"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.9202,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88741286,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"70","issue":"1","first_page":"4005","last_page":"4015"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6903002262115479},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6672202944755554},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.6157900094985962},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.5821681618690491},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5336658954620361},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.48581361770629883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4846249520778656},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4553409814834595},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3893807828426361},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.36903393268585205},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.35268062353134155},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1798907220363617},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17981350421905518}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6903002262115479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6672202944755554},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.6157900094985962},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.5821681618690491},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5336658954620361},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.48581361770629883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4846249520778656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4553409814834595},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3893807828426361},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36903393268585205},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.35268062353134155},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1798907220363617},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17981350421905518},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2023.3307697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2023.3307697","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G10506919","display_name":null,"funder_award_id":"62272350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2165423621","display_name":null,"funder_award_id":"2042023KF0203","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W195382131","https://openalex.org/W1516634197","https://openalex.org/W1531217702","https://openalex.org/W1569083856","https://openalex.org/W1591524234","https://openalex.org/W1599446772","https://openalex.org/W1653866131","https://openalex.org/W1786924502","https://openalex.org/W1919093791","https://openalex.org/W2009978458","https://openalex.org/W2083430496","https://openalex.org/W2110634303","https://openalex.org/W2149350464","https://openalex.org/W2157285143","https://openalex.org/W2191386103","https://openalex.org/W2296328808","https://openalex.org/W2745605851","https://openalex.org/W2783596173","https://openalex.org/W2791208937","https://openalex.org/W2901575754","https://openalex.org/W2902756306","https://openalex.org/W2905523725","https://openalex.org/W2918481698","https://openalex.org/W2961087419","https://openalex.org/W2996906899","https://openalex.org/W3012437309","https://openalex.org/W3120775420","https://openalex.org/W3128401974","https://openalex.org/W3206749114","https://openalex.org/W4225145151","https://openalex.org/W4292826013","https://openalex.org/W4293566735","https://openalex.org/W4313055779"],"related_works":["https://openalex.org/W2077461987","https://openalex.org/W1891552123","https://openalex.org/W1499103434","https://openalex.org/W1810303253","https://openalex.org/W2915550258","https://openalex.org/W2662454373","https://openalex.org/W2390122016","https://openalex.org/W1490519238","https://openalex.org/W2904818008","https://openalex.org/W1566541866"],"abstract_inverted_index":{"Smart":[0,70],"home":[1,33,61,71,90,133],"refers":[2],"to":[3,81,121,125,207],"the":[4,32,54,108,172,182,188,194,208],"automation":[5],"and":[6,15,25,35,41,50,74,85,118,162],"intelligent":[7],"management":[8],"of":[9,17,56,67,157],"family":[10],"life":[11],"using":[12],"information":[13],"technology":[14],"Internet":[16],"Things":[18],"technology,":[19],"including":[20],"various":[21],"smart":[22,60,89,132,213],"household":[23,39,46],"appliances":[24,47],"low-power":[26,88],"sensors.":[27],"Low-power":[28],"sensors":[29],"can":[30,43],"monitor":[31],"environment":[34],"share":[36],"data":[37,72,83,129,209],"with":[38,166,171],"appliances,":[40],"users":[42],"remotely":[44],"control":[45],"through":[48],"smartphones":[49],"other":[51],"devices.":[52],"With":[53],"popularity":[55],"consumer":[57,91],"electronic":[58],"devices,":[59],"has":[62,154,202],"become":[63],"an":[64,137,155],"indispensable":[65],"part":[66],"our":[68,152,177],"life.":[69],"security":[73,210],"privacy":[75],"leakage":[76],"accidents":[77],"occur":[78],"frequently,":[79],"how":[80],"protect":[82],"confidentiality":[84],"unforgeability":[86],"for":[87],"electronics":[92],"is":[93],"a":[94,204],"key":[95],"problem.":[96],"To":[97],"solve":[98],"this":[99],"problem,":[100],"scholars":[101],"have":[102,111],"proposed":[103,178,199],"many":[104],"cryptographic":[105,200],"schemes.":[106],"However,":[107],"existing":[109],"schemes":[110],"low":[112],"computational":[113,183],"efficiency,":[114],"high":[115],"communication":[116,163,196],"overhead,":[117],"poor":[119],"adaptation":[120],"application":[122],"scenarios.":[123],"Therefore,":[124],"realize":[126],"secure":[127],"lightweight":[128],"sharing":[130,211],"in":[131,160,212],"systems,":[134],"we":[135],"propose":[136],"efficient":[138],"certificateless":[139],"online/offline":[140],"signcryption":[141,190],"(CLOOSC)":[142],"scheme":[143,153],"without":[144],"bilinear":[145,167],"pairing.":[146],"The":[147,198],"performance":[148],"analysis":[149],"demonstrates":[150],"that":[151],"order":[156],"magnitude":[158],"advantage":[159],"computation":[161],"overhead":[164],"compared":[165],"pairing-based":[168],"CLOOSC.":[169],"Compared":[170],"latest":[173],"pairing-free":[174],"CLOOSC":[175],"scheme,":[176],"approach":[179],"significantly":[180],"reduces":[181],"cost":[184],"by":[185],"one-third":[186],"during":[187],"offline":[189],"phase":[191],"while":[192],"maintaining":[193],"same":[195],"overhead.":[197],"algorithm":[201],"made":[203],"substantial":[205],"contribution":[206],"homes.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
