{"id":"https://openalex.org/W4410591309","doi":"https://doi.org/10.1109/tce.2025.3572470","title":"Post-Quantum Verifiable Decryption Scheme for Internet of Thing-Based Consumer Electronic Edge Device","display_name":"Post-Quantum Verifiable Decryption Scheme for Internet of Thing-Based Consumer Electronic Edge Device","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4410591309","doi":"https://doi.org/10.1109/tce.2025.3572470"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3572470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3572470","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049534923","display_name":"Ruihang Huang","orcid":"https://orcid.org/0000-0001-9042-1762"},"institutions":[{"id":"https://openalex.org/I4210089621","display_name":"Chizhou University","ror":"https://ror.org/007cx7r28","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210089621"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruihang Huang","raw_affiliation_strings":["School of Literature and Communicaiton, Chizhou University, Chizhou, China","Chizhou University, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Literature and Communicaiton, Chizhou University, Chizhou, China","institution_ids":["https://openalex.org/I4210089621"]},{"raw_affiliation_string":"Chizhou University, Anhui, China","institution_ids":["https://openalex.org/I4210089621"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011925762","display_name":"Ashutosh Sharma","orcid":"https://orcid.org/0000-0002-4990-5252"},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ashutosh Sharma","raw_affiliation_strings":["Business School, Henan University of Science and Technology, Luoyang, Henan, China"],"affiliations":[{"raw_affiliation_string":"Business School, Henan University of Science and Technology, Luoyang, Henan, China","institution_ids":["https://openalex.org/I167383011"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049534923"],"corresponding_institution_ids":["https://openalex.org/I4210089621"],"apc_list":null,"apc_paid":null,"fwci":6.2972,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96496473,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"71","issue":"2","first_page":"4903","last_page":"4913"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.3183000087738037,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.3183000087738037,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.651597797870636},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5651367902755737},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5619382262229919},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.561145544052124},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5093992352485657},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.484640896320343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41522741317749023},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35291579365730286},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2871771454811096},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13370928168296814},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10145151615142822}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.651597797870636},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5651367902755737},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5619382262229919},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.561145544052124},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5093992352485657},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.484640896320343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41522741317749023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35291579365730286},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2871771454811096},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13370928168296814},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10145151615142822},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3572470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3572470","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2770306303","https://openalex.org/W2953289753","https://openalex.org/W2998033988","https://openalex.org/W3011052769","https://openalex.org/W3028856548","https://openalex.org/W3096585123","https://openalex.org/W3121038557","https://openalex.org/W3135750780","https://openalex.org/W3159189932","https://openalex.org/W3160509973","https://openalex.org/W4207043551","https://openalex.org/W4210722209","https://openalex.org/W4226106055","https://openalex.org/W4283781252","https://openalex.org/W4283820151","https://openalex.org/W4286655990","https://openalex.org/W4320002831","https://openalex.org/W4361209836","https://openalex.org/W4388052858","https://openalex.org/W4388262770","https://openalex.org/W4390887491","https://openalex.org/W4391972873","https://openalex.org/W4392207736","https://openalex.org/W4392796934","https://openalex.org/W4393398134","https://openalex.org/W4398248177","https://openalex.org/W4399117525","https://openalex.org/W4399728471","https://openalex.org/W4399994970","https://openalex.org/W4400904554","https://openalex.org/W4401070306","https://openalex.org/W4402810915","https://openalex.org/W4403481668","https://openalex.org/W4405180660"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2364126283","https://openalex.org/W4383721755"],"abstract_inverted_index":{"The":[0],"Edge-computing":[1],"era":[2],"presents":[3],"opportunities":[4],"for":[5,81,117,149,196],"the":[6,10,44,60,66,69,76,100,112,122,131,137,142,146,188,191,208],"rapid":[7,70],"development":[8,71],"of":[9,12,47,63,68,72,144,154,181,193,211],"Internet":[11],"Things":[13],"(IoT),":[14],"where":[15],"identity":[16,29,132,204],"authentication":[17,30,91,133,178],"is":[18,97,109,170,225],"fundamental":[19],"to":[20,36,43,58,126,175,220],"ensuring":[21],"IoT":[22,48,197,235],"security.":[23],"However,":[24],"under":[25],"post-quantum":[26,232],"attacks,":[27],"traditional":[28],"schemes":[31,51],"that":[32,187,227],"rely":[33],"on":[34,94,136,179],"signcryption":[35,90,212],"generate":[37,127],"node":[38],"keys":[39],"face":[40],"challenges":[41],"due":[42],"high":[45],"number":[46,192],"nodes.":[49],"These":[50],"consume":[52],"significant":[53],"resources,":[54],"making":[55],"it":[56,224],"difficult":[57],"meet":[59],"low-cost":[61],"requirements":[62],"IoT.":[64],"Against":[65],"backdrop":[67],"new":[73],"media":[74],"and":[75,120,141,152,167,206,213],"increasingly":[77],"growing":[78],"security":[79],"demands":[80],"resource-constrained":[82],"consumer":[83],"electronic":[84],"edge":[85],"devices,":[86],"a":[87,157],"lightweight":[88],"group":[89,173,182],"scheme":[92,147,189,229],"based":[93,135],"lattice":[95],"cryptography":[96],"proposed.":[98],"During":[99],"key":[101,118],"generation":[102,119],"phase,":[103,134],"an":[104],"improved":[105],"trapdoor":[106],"diagonal":[107],"matrix":[108],"designed,":[110],"optimizing":[111],"preimage":[113],"sampling":[114],"algorithm":[115],"required":[116,195],"reducing":[121],"total":[123,209],"time":[124],"needed":[125],"multiple":[128],"keys.":[129],"In":[130],"leftover":[138],"hash":[139,168],"lemma":[140],"properties":[143],"signcryption,":[145],"allows":[148],"simultaneous":[150],"signing":[151],"encryption":[153],"messages":[155],"in":[156,234],"single":[158],"logical":[159],"step.":[160],"A":[161],"low-interaction":[162],"protocol":[163],"combining":[164],"dot":[165],"products":[166],"operations":[169],"proposed,":[171],"enabling":[172],"leaders":[174],"perform":[176],"access":[177],"behalf":[180],"members.":[183],"Simulation":[184],"results":[185],"show":[186],"reduces":[190,207],"interactions":[194],"device":[198],"access,":[199],"lowers":[200],"computational":[201],"costs":[202],"during":[203],"authentication,":[205],"cost":[210],"un-signcryption":[214],"by":[215],"at":[216],"least":[217],"7%":[218],"compared":[219],"existing":[221],"schemes.":[222],"Additionally,":[223],"demonstrated":[226],"this":[228],"can":[230],"resist":[231],"attacks":[233],"environments.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
