{"id":"https://openalex.org/W2808403644","doi":"https://doi.org/10.1155/2018/2595273","title":"New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment","display_name":"New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment","publication_year":2018,"publication_date":"2018-06-13","ids":{"openalex":"https://openalex.org/W2808403644","doi":"https://doi.org/10.1155/2018/2595273","mag":"2808403644"},"language":"en","primary_location":{"id":"doi:10.1155/2018/2595273","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2595273","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2595273.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2018/2595273.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108047844","display_name":"Libing Wu","orcid":"https://orcid.org/0000-0001-9897-1953"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libing Wu","raw_affiliation_strings":["The Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China","The Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"The Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"The Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048127606","display_name":"Zhiyan Xu","orcid":"https://orcid.org/0000-0002-8443-8282"},"institutions":[{"id":"https://openalex.org/I4210154851","display_name":"Hubei University of Education","ror":"https://ror.org/04f41cb79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154851"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyan Xu","raw_affiliation_strings":["The College of Computer, Hubei University of Education, Wuhan, China","The Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer, Hubei University of Education, Wuhan, China","institution_ids":["https://openalex.org/I4210154851"]},{"raw_affiliation_string":"The Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["The Computer School, Wuhan University, Wuhan, China","The State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"The Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020675795","display_name":"Xianmin Wang","orcid":"https://orcid.org/0000-0003-3480-8780"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianmin Wang","raw_affiliation_strings":["The School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"The School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048127606"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210154851"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":5.2123,"has_fulltext":true,"cited_by_count":60,"citation_normalized_percentile":{"value":0.96354647,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8134744167327881},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6115031838417053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6103491187095642},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5845150947570801},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5200719237327576},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.499408483505249},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.49880290031433105},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4791231155395508},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4515185058116913},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4445480704307556},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.18214452266693115},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1166636049747467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8134744167327881},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6115031838417053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6103491187095642},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5845150947570801},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5200719237327576},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.499408483505249},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.49880290031433105},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4791231155395508},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4515185058116913},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4445480704307556},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.18214452266693115},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1166636049747467},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/2595273","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2595273","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2595273.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:176bb90e5f284b52a7dc3d76bbef2552","is_oa":true,"landing_page_url":"https://doaj.org/article/176bb90e5f284b52a7dc3d76bbef2552","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/2595273","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2595273","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2595273.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2808403644.pdf","grobid_xml":"https://content.openalex.org/works/W2808403644.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1605032032","https://openalex.org/W1667889362","https://openalex.org/W1788452017","https://openalex.org/W2012382733","https://openalex.org/W2012902875","https://openalex.org/W2013752865","https://openalex.org/W2033607738","https://openalex.org/W2035204644","https://openalex.org/W2040987689","https://openalex.org/W2055669098","https://openalex.org/W2083514219","https://openalex.org/W2088588705","https://openalex.org/W2091291608","https://openalex.org/W2096025074","https://openalex.org/W2108967892","https://openalex.org/W2137807850","https://openalex.org/W2153576358","https://openalex.org/W2156186849","https://openalex.org/W2164140052","https://openalex.org/W2182633315","https://openalex.org/W2524195644","https://openalex.org/W2604462068","https://openalex.org/W2618824331","https://openalex.org/W2753923799","https://openalex.org/W2786793274"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W2802581102","https://openalex.org/W2384844651"],"abstract_inverted_index":{"With":[0],"the":[1,7,34,43,50,65,162,177,190,202,211,231],"application":[2],"of":[3,9,46,54,61,76,88,101,136,204],"sensor":[4,122,234],"technology":[5],"in":[6,14,83,99,139],"field":[8],"healthcare,":[10],"online":[11],"data":[12,56,70],"sharing":[13],"healthcare":[15,66,120,232],"industry":[16],"attracts":[17],"more":[18,20,226],"and":[19,37,52,72,94,104,160,180,197,228],"attention":[21],"since":[22,152],"it":[23,153],"has":[24],"many":[25],"advantages,":[26],"such":[27],"as":[28],"high":[29],"efficiency,":[30],"low":[31],"latency,":[32],"breaking":[33],"geographical":[35],"location,":[36],"time":[38],"constraints.":[39],"However,":[40,138],"due":[41],"to":[42,64,132,148,156,175,237],"direct":[44],"involvement":[45],"patient":[47],"health":[48],"information,":[49],"privacy":[51,71],"integrity":[53],"medical":[55],"have":[57,80],"become":[58],"a":[59,74,114,134,169],"matter":[60],"much":[62],"concern":[63],"industry.":[67],"To":[68],"retain":[69],"integrity,":[73],"number":[75],"digital":[77],"signature":[78,117,128,157,173],"schemes":[79],"been":[81],"introduced":[82],"recent":[84],"years.":[85],"Unfortunately,":[86],"most":[87],"them":[89],"suffer":[90],"serious":[91],"security":[92,178,203,239],"attacks":[93],"do":[95],"not":[96],"perform":[97],"well":[98],"terms":[100],"computation":[102,212],"overhead":[103],"communication":[105],"overhead.":[106],"Very":[107],"recently,":[108],"Pankaj":[109,216],"Kumar":[110,217],"et":[111,218],"al.":[112,219],"proposed":[113,185,223],"certificateless":[115,171],"aggregate":[116,172],"scheme":[118,129,146,174,186,224],"for":[119,230],"wireless":[121,233],"network.":[123],"They":[124],"claimed":[125],"that":[126,144,183,201],"their":[127,145],"was":[130],"able":[131],"withstand":[133],"variety":[135],"attacks.":[137],"this":[140],"paper,":[141],"we":[142,167],"find":[143],"fails":[147],"achieve":[149],"its":[150],"purpose":[151],"is":[154,187,207,225],"vulnerable":[155],"forgery":[158],"attack":[159,164],"give":[161],"detailed":[163],"process.":[165],"Then,":[166],"propose":[168],"new":[170],"fix":[176],"flaws":[179],"formally":[181],"prove":[182],"our":[184,205,222],"secure":[188],"under":[189],"computationally":[191],"hard":[192],"Diffie-Hellman":[193],"assumption.":[194],"Security":[195],"analysis":[196],"performance":[198],"evaluation":[199],"demonstrate":[200],"proposal":[206],"improved":[208],"while":[209],"reducing":[210],"cost.":[213],"Compared":[214],"with":[215],"'s":[220],"scheme,":[221],"efficient":[227],"suitable":[229],"networks":[235],"(HWSNs)":[236],"maintain":[238],"at":[240],"various":[241],"levels.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
