{"id":"https://openalex.org/W4405786479","doi":"https://doi.org/10.1109/tifs.2024.3523198","title":"Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT","display_name":"Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT","publication_year":2024,"publication_date":"2024-12-25","ids":{"openalex":"https://openalex.org/W4405786479","doi":"https://doi.org/10.1109/tifs.2024.3523198"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3523198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3523198","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101559309","display_name":"Meifang Zeng","orcid":"https://orcid.org/0000-0001-6216-3970"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingwei Zeng","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101559309"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":6.1809,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.96897852,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"20","issue":null,"first_page":"996","last_page":"1010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9463000297546387,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8301354646682739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5955139398574829},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5827097296714783},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5825019478797913},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.558865487575531},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5097991824150085},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47478386759757996},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4462340474128723}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8301354646682739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5955139398574829},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5827097296714783},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5825019478797913},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.558865487575531},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5097991824150085},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47478386759757996},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4462340474128723},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3523198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3523198","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1101349560","display_name":null,"funder_award_id":"2208085QF198","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G1303638838","display_name":null,"funder_award_id":"62325209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5289009734","display_name":null,"funder_award_id":"62372002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6532556903","display_name":null,"funder_award_id":"U24A20243","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1528195422","https://openalex.org/W1998902045","https://openalex.org/W2029693536","https://openalex.org/W2086472480","https://openalex.org/W2135656098","https://openalex.org/W2163614799","https://openalex.org/W2164736940","https://openalex.org/W2169194339","https://openalex.org/W2172174332","https://openalex.org/W2334931593","https://openalex.org/W2688317400","https://openalex.org/W2791853684","https://openalex.org/W2810013968","https://openalex.org/W2945384854","https://openalex.org/W2993620483","https://openalex.org/W3010858269","https://openalex.org/W3015913521","https://openalex.org/W3016340377","https://openalex.org/W3095270432","https://openalex.org/W3108643162","https://openalex.org/W3114307879","https://openalex.org/W3174304286","https://openalex.org/W3181914005","https://openalex.org/W3195427644","https://openalex.org/W3202291135","https://openalex.org/W4210421291","https://openalex.org/W4235440377","https://openalex.org/W4285153536","https://openalex.org/W4311080749","https://openalex.org/W4312304622","https://openalex.org/W4312328866","https://openalex.org/W4313149364","https://openalex.org/W4319068551","https://openalex.org/W4323545840","https://openalex.org/W4380839239","https://openalex.org/W4386598263","https://openalex.org/W4387951915","https://openalex.org/W4394627600"],"related_works":["https://openalex.org/W2242172122","https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199"],"abstract_inverted_index":{"The":[0,112],"rapid":[1],"evolution":[2],"of":[3,7,38,153,166,200],"the":[4,27,36,63,150,164,167,187,192],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"has":[10],"necessitated":[11],"increased":[12],"device":[13],"interactions":[14,72,121],"across":[15],"various":[16,184],"management":[17],"domains.":[18],"This":[19,31,131],"entails":[20],"devices":[21,58,154],"from":[22,70],"different":[23],"domains":[24,52],"collaborating":[25],"on":[26,88],"same":[28,64],"production":[29,158],"task.":[30],"poses":[32],"significant":[33],"challenges":[34],"for":[35,128],"dynamics":[37],"cross-domain":[39,43,109,116],"authentication":[40,44,110,118],"schemes.":[41],"Traditional":[42],"schemes":[45,68],"struggle":[46],"to":[47,104,179],"support":[48],"seamless":[49],"switching":[50],"between":[51],"and":[53,61,73,92,122,136,141,159,175,202],"face":[54],"difficulties":[55],"when":[56],"accommodating":[57],"that":[59,191],"join":[60],"leave":[62],"domain.":[65],"Moreover,":[66],"these":[67,78],"suffer":[69],"intricate":[71],"suboptimal":[74],"efficiency.":[75],"To":[76],"address":[77],"issues,":[79],"we":[80],"propose":[81],"a":[82,89,93,144,171],"dynamic":[83,90,145,151],"group":[84],"signature":[85],"scheme":[86,100,114,169,194],"based":[87],"accumulator":[91],"non-interactive":[94],"zero-knowledge":[95],"proof.":[96],"We":[97,162],"integrated":[98],"this":[99],"with":[101,119],"blockchain":[102],"technology":[103],"construct":[105],"an":[106,124],"efficient":[107,125,138],"revocation":[108,126],"scheme.":[111],"proposed":[113,168,193],"enables":[115,137],"anonymous":[117],"simple":[120],"provides":[123],"function":[127],"illegal":[129],"devices.":[130],"approach":[132],"ensures":[133],"conditional":[134],"privacy-preserving":[135],"member":[139],"joining":[140],"exiting":[142],"through":[143],"accumulator.":[146],"It":[147],"effectively":[148],"addresses":[149],"requirements":[152],"involved":[155],"in":[156,198],"IIoT":[157],"manufacturing":[160],"processes.":[161],"prove":[163],"security":[165],"using":[170],"random":[172],"Oracle":[173],"model":[174],"conduct":[176],"thorough":[177],"analyses":[178],"verify":[180],"its":[181],"resistance":[182],"against":[183],"attacks.":[185],"Furthermore,":[186],"experimental":[188],"results":[189],"demonstrate":[190],"achieves":[195],"better":[196],"performance":[197],"terms":[199],"computational":[201],"communication":[203],"costs.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":15}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
