{"id":"https://openalex.org/W4385062332","doi":"https://doi.org/10.1109/tifs.2023.3297327","title":"Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT","display_name":"Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385062332","doi":"https://doi.org/10.1109/tifs.2023.3297327"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3297327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3297327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077083115","display_name":"Tian Li","orcid":"https://orcid.org/0000-0001-7509-7845"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I4210101451","display_name":"Nanjing University of Industry Technology","ror":"https://ror.org/00qf07q44","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210101451"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tian Li","raw_affiliation_strings":["State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","Department of Industrial Internet, School of Computer and Software, Nanjing Vocational University of Industry Technology, Nanjing, China","State Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Department of Industrial Internet, School of Computer and Software, Nanjing Vocational University of Industry Technology, Nanjing, China","institution_ids":["https://openalex.org/I4210101451"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077083115"],"corresponding_institution_ids":["https://openalex.org/I178232147","https://openalex.org/I4210101451"],"apc_list":null,"apc_paid":null,"fwci":5.1909,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.96431779,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"4640","last_page":"4651"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8554227352142334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5948362946510315},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5599112510681152},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5417256355285645},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5018763542175293},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.4706909954547882},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.46874502301216125},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.46404120326042175},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43883639574050903},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.43169087171554565},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41596537828445435},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4109998345375061},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3139870762825012},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.22537016868591309},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.08030650019645691}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8554227352142334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5948362946510315},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5599112510681152},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5417256355285645},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5018763542175293},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4706909954547882},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.46874502301216125},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.46404120326042175},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43883639574050903},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.43169087171554565},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41596537828445435},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4109998345375061},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3139870762825012},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.22537016868591309},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.08030650019645691},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3297327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3297327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7876586153","display_name":null,"funder_award_id":"62272238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W198492818","https://openalex.org/W1497727788","https://openalex.org/W1553968376","https://openalex.org/W1788452017","https://openalex.org/W1921672120","https://openalex.org/W1922372005","https://openalex.org/W2015482338","https://openalex.org/W2086042811","https://openalex.org/W2100516022","https://openalex.org/W2141943180","https://openalex.org/W2169194339","https://openalex.org/W2337909812","https://openalex.org/W2558465299","https://openalex.org/W2604150187","https://openalex.org/W2742348833","https://openalex.org/W2753923799","https://openalex.org/W2783159385","https://openalex.org/W2783647977","https://openalex.org/W2800197349","https://openalex.org/W2888371453","https://openalex.org/W2918475629","https://openalex.org/W2919530665","https://openalex.org/W2942857030","https://openalex.org/W2949555224","https://openalex.org/W2955829994","https://openalex.org/W2974993007","https://openalex.org/W2978245615","https://openalex.org/W2980633110","https://openalex.org/W3000142059","https://openalex.org/W3005719348","https://openalex.org/W3012425590","https://openalex.org/W3015003218","https://openalex.org/W3089096050","https://openalex.org/W3090201584","https://openalex.org/W3112872188","https://openalex.org/W3112892639","https://openalex.org/W3117676164","https://openalex.org/W3127976691","https://openalex.org/W3188286971","https://openalex.org/W3206934513","https://openalex.org/W4248175462","https://openalex.org/W4285819296","https://openalex.org/W4319863694","https://openalex.org/W4321484085","https://openalex.org/W4323269162","https://openalex.org/W6608145684","https://openalex.org/W6640233077","https://openalex.org/W6681005146"],"related_works":["https://openalex.org/W1592978631","https://openalex.org/W4255106211","https://openalex.org/W2766329713","https://openalex.org/W2120644424","https://openalex.org/W2290626493","https://openalex.org/W3082121784","https://openalex.org/W2100707674","https://openalex.org/W1994220746","https://openalex.org/W2387292094","https://openalex.org/W60586779"],"abstract_inverted_index":{"Aggregate":[0],"signatures":[1,14],"enable":[2],"the":[3,16,26,41,48,59,69,86,115,133,137,142,146,150,185,195],"sensor":[4,44],"nodes":[5],"of":[6,9,43,53,56,149,173,214],"Industrial":[7,54,212],"Internet":[8,55,213],"Things":[10],"to":[11,15,18,80,107,122,127,141,167],"send":[12],"their":[13],"aggregator":[17,116,134],"realize":[19],"signature":[20,99,148,192],"compression.":[21],"Before":[22],"being":[23],"stored":[24],"in":[25,40,85],"data":[27,30,33,37,45,83,110,139,152,163,182],"center,":[28],"sensitive":[29,82,109,138,151,162],"and":[31,144,180,201,209],"non-sensitive":[32],"should":[34],"adopt":[35],"different":[36],"processing":[38],"methods":[39],"process":[42],"fusion.":[46],"In":[47,112],"high":[49,64],"security":[50,65,171,197],"analysis":[51],"scenario":[52],"Things,":[57],"only":[58,121],"verifier":[60],"with":[61],"a":[62,96,154],"specified":[63],"level":[66],"can":[67,117,135,159],"verify":[68],"resulting":[70],"aggregate":[71,88,98,123],"signature.":[72,156],"So":[73],"far,":[74],"no":[75],"one":[76],"has":[77],"explored":[78],"how":[79],"ensure":[81],"privacy":[84],"designated-verifier":[87,97],"signatures.":[89],"Motivated":[90],"by":[91],"it,":[92],"this":[93,113],"paper":[94],"proposes":[95],"scheme":[100],"(named":[101],"DVAS)":[102],"based":[103],"on":[104],"permissioned":[105],"blockchain":[106],"achieve":[108,160],"privacy.":[111,183],"scheme,":[114],"be":[118],"used":[119],"not":[120,165],"signatures,":[124],"but":[125],"also":[126],"sanitize":[128,136],"data.":[129],"Through":[130],"smart":[131],"contracts,":[132],"according":[140],"contract,":[143],"convert":[145],"original":[147],"into":[153],"valid":[155],"Therefore,":[157],"DVAS":[158,174,188,205],"elastic":[161],"privacy,":[164],"limited":[166],"encryption":[168],"operations.":[169],"The":[170],"attributes":[172],"include":[175],"conditional":[176],"anonymity,":[177],"unforgeability,":[178],"immutability":[179],"protecting":[181],"At":[184],"same":[186],"time,":[187],"realizes":[189],"accountability":[190],"through":[191],"verification.":[193],"Finally,":[194],"formal":[196],"proof,":[198],"performance":[199],"evaluation":[200],"experiments":[202],"indicate":[203],"that":[204],"is":[206],"secure,":[207],"effective":[208],"practical":[210],"for":[211],"Things.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
