{"id":"https://openalex.org/W4396918925","doi":"https://doi.org/10.3390/info15050282","title":"Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves","display_name":"Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves","publication_year":2024,"publication_date":"2024-05-15","ids":{"openalex":"https://openalex.org/W4396918925","doi":"https://doi.org/10.3390/info15050282"},"language":"en","primary_location":{"id":"doi:10.3390/info15050282","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050282","pdf_url":"https://www.mdpi.com/2078-2489/15/5/282/pdf?version=1715778537","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/5/282/pdf?version=1715778537","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075325675","display_name":"Junaid Khan","orcid":"https://orcid.org/0009-0008-6550-7618"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junaid Khan","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081734128","display_name":"Congxu Zhu","orcid":"https://orcid.org/0000-0002-9662-0532"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Congxu Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101840247","display_name":"W. Khairuddin W. Ali","orcid":"https://orcid.org/0009-0002-7911-5793"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wajid Ali","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031989062","display_name":"Muhammad Asim","orcid":"https://orcid.org/0000-0002-6423-9809"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]},{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN","SA"],"is_corresponding":true,"raw_author_name":"Muhammad Asim","raw_affiliation_strings":["EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia","School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China"],"affiliations":[{"raw_affiliation_string":"EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062500650","display_name":"Sadique Ahmad","orcid":"https://orcid.org/0000-0001-6907-2318"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sadique Ahmad","raw_affiliation_strings":["EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031989062","https://openalex.org/A5081734128"],"corresponding_institution_ids":["https://openalex.org/I139024713","https://openalex.org/I139660479","https://openalex.org/I142024983"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.4504,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83821445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"15","issue":"5","first_page":"282","last_page":"282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.993720531463623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5588167905807495},{"id":"https://openalex.org/keywords/hyperelliptic-curve-cryptography","display_name":"Hyperelliptic curve cryptography","score":0.4442245364189148},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43012702465057373},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3327968418598175},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32349613308906555},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2845812737941742},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.258281409740448},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17595970630645752},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.16587036848068237}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.993720531463623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5588167905807495},{"id":"https://openalex.org/C166780011","wikidata":"https://www.wikidata.org/wiki/Q3005926","display_name":"Hyperelliptic curve cryptography","level":5,"score":0.4442245364189148},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43012702465057373},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3327968418598175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32349613308906555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2845812737941742},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.258281409740448},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17595970630645752},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.16587036848068237}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15050282","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050282","pdf_url":"https://www.mdpi.com/2078-2489/15/5/282/pdf?version=1715778537","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9da3288183a24ff085285ee8e9a3e497","is_oa":true,"landing_page_url":"https://doaj.org/article/9da3288183a24ff085285ee8e9a3e497","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 5, p 282 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15050282","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050282","pdf_url":"https://www.mdpi.com/2078-2489/15/5/282/pdf?version=1715778537","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396918925.pdf"},"referenced_works_count":72,"referenced_works":["https://openalex.org/W2021612229","https://openalex.org/W2024406794","https://openalex.org/W2100647543","https://openalex.org/W2165526921","https://openalex.org/W2171606638","https://openalex.org/W2185385784","https://openalex.org/W2618136360","https://openalex.org/W2747000223","https://openalex.org/W2765182809","https://openalex.org/W2767082455","https://openalex.org/W2792421194","https://openalex.org/W2801912887","https://openalex.org/W2804624540","https://openalex.org/W2805053455","https://openalex.org/W2810364281","https://openalex.org/W2900988900","https://openalex.org/W2909797605","https://openalex.org/W2944807128","https://openalex.org/W2996505211","https://openalex.org/W2998349500","https://openalex.org/W3000686792","https://openalex.org/W3014115803","https://openalex.org/W3034175800","https://openalex.org/W3038330551","https://openalex.org/W3045738293","https://openalex.org/W3104224871","https://openalex.org/W3108667781","https://openalex.org/W3112281491","https://openalex.org/W3140630188","https://openalex.org/W3175470393","https://openalex.org/W3187046391","https://openalex.org/W3197511691","https://openalex.org/W3200254765","https://openalex.org/W3206199346","https://openalex.org/W3207201346","https://openalex.org/W3209159586","https://openalex.org/W4200618274","https://openalex.org/W4224228813","https://openalex.org/W4224296246","https://openalex.org/W4229021939","https://openalex.org/W4286582030","https://openalex.org/W4291909864","https://openalex.org/W4295749910","https://openalex.org/W4303444730","https://openalex.org/W4308972488","https://openalex.org/W4309339011","https://openalex.org/W4310999136","https://openalex.org/W4311270812","https://openalex.org/W4313201775","https://openalex.org/W4316039105","https://openalex.org/W4321269827","https://openalex.org/W4360603373","https://openalex.org/W4366283699","https://openalex.org/W4366977512","https://openalex.org/W4377291866","https://openalex.org/W4378516452","https://openalex.org/W4378800408","https://openalex.org/W4384405809","https://openalex.org/W4384831342","https://openalex.org/W6686658085","https://openalex.org/W6736354671","https://openalex.org/W6756707661","https://openalex.org/W6771363648","https://openalex.org/W6780339135","https://openalex.org/W6792141161","https://openalex.org/W6801365210","https://openalex.org/W6802412030","https://openalex.org/W6809880077","https://openalex.org/W6840400012","https://openalex.org/W6842587026","https://openalex.org/W6849695690","https://openalex.org/W6861956169"],"related_works":["https://openalex.org/W2384216712","https://openalex.org/W54013283","https://openalex.org/W4247729863","https://openalex.org/W2361261002","https://openalex.org/W2030294917","https://openalex.org/W2003570966","https://openalex.org/W2952984876","https://openalex.org/W2162823500","https://openalex.org/W2520732311","https://openalex.org/W4312568090"],"abstract_inverted_index":{"Security":[0],"and":[1,18,43,52,57,68,77,102,166,183],"efficiency":[2,184],"remain":[3],"a":[4,120,146,172],"serious":[5],"concern":[6],"for":[7,80,200],"Internet":[8],"of":[9,87,186],"Things":[10],"(IoT)":[11],"environments":[12],"due":[13,149],"to":[14,64,104,150],"the":[15,26,65,85,140,181,201],"resource-constrained":[16,187],"nature":[17,67],"wireless":[19],"communication.":[20],"Traditional":[21],"schemes":[22],"are":[23,50,74,78],"based":[24,124,144],"on":[25,125,145],"main":[27],"mathematical":[28,137],"operations,":[29,38],"including":[30],"pairing,":[31,36],"pairing-based":[32],"scalar":[33,41],"multiplication,":[34,42,129],"bilinear":[35],"exponential":[37],"elliptic":[39],"curve":[40,127],"point":[44],"multiplication":[45],"operations.":[46,138],"These":[47],"traditional":[48,72,92,136],"operands":[49],"cost-intensive":[51,66],"require":[53],"high":[54,69,111],"computing":[55],"power":[56],"bandwidth":[58],"overload,":[59],"thus":[60],"affecting":[61],"efficiency.":[62],"Due":[63],"resource":[70],"requirements,":[71],"approaches":[73],"not":[75],"feasible":[76],"unsuitable":[79],"resource-limited":[81],"IoT":[82],"devices.":[83,188],"Furthermore,":[84],"lack":[86],"essential":[88],"security":[89,109,155,182,195],"attributes":[90],"in":[91,204],"schemes,":[93],"such":[94],"as":[95],"unforgeability,":[96],"public":[97],"verifiability,":[98],"non-repudiation,":[99],"forward":[100],"secrecy,":[101],"resistance":[103],"denial-of-service":[105],"attacks,":[106],"puts":[107],"data":[108],"at":[110],"risk.":[112],"To":[113],"overcome":[114],"these":[115],"challenges,":[116],"we":[117],"have":[118],"introduced":[119],"novel":[121],"signcryption":[122],"algorithm":[123],"hyperelliptic":[126,147],"divisor":[128],"which":[130,151,197],"is":[131,143],"much":[132],"faster":[133],"than":[134],"other":[135],"Hence,":[139],"proposed":[141,190,202],"methodology":[142,203],"curve,":[148],"it":[152],"has":[153],"enhanced":[154],"with":[156],"smaller":[157],"key":[158],"sizes":[159],"that":[160],"reduce":[161],"computational":[162],"complexity":[163,168],"by":[164,169,175],"38.16%":[165],"communication":[167],"62.5%,":[170],"providing":[171],"well-balanced":[173],"solution":[174],"utilizing":[176],"few":[177],"resources":[178],"while":[179],"meeting":[180],"requirements":[185],"The":[189],"strategy":[191],"also":[192],"involves":[193],"formal":[194],"validation,":[196],"provides":[198],"confidence":[199],"practical":[205],"implementations.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
