iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/CPE.6243
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:44:58Z","timestamp":1726850698882},"reference-count":30,"publisher":"Wiley","issue":"13","license":[{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2021,7,10]]},"abstract":"Summary<\/jats:title>With the development of information technology, the Internet of Things terminals are vulnerable to threats such as eavesdropping, tampering, and counterfeiting. The application of threshold group signature technology can effectively ensure the security of the system in applications such as battlefield intelligent decision\u2010making, connected vehicles, and intelligent manufacturing. However, the existing threshold group signature schemes lack the two\u2010way trusted authentication mechanism between group members and group manager, and group manager can easily become a security risk for the entire signature system. To solve this problem, this paper proposes a threshold group signature scheme based on elliptic curve that achieves mutual authentication of group members and group manager. The security analysis proves that the proposed scheme is anonymous, traceable, and can resist collusion attacks and frame attacks. The results of performance analysis and comparison also show that under the same security strength, the scheme proposed has shorter signature length, lower calculation amount for signature generation and signature verification, which can effectively reduce the communication and calculation overhead of the IoT terminal, and can be better applied to the Internet of Things application scenarios.<\/jats:p>","DOI":"10.1002\/cpe.6243","type":"journal-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T15:24:55Z","timestamp":1614871495000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A threshold group signature scheme suitable for the Internet of Things"],"prefix":"10.1002","volume":"33","author":[{"given":"Bei","family":"Gong","sequence":"first","affiliation":[{"name":"Faculty of Information Technology Beijing University of Technology Beijing China"},{"name":"Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China"}]},{"given":"Xinyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology Beijing University of Technology Beijing China"},{"name":"Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4549-5038","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Information Beijing Wuzi University Beijing China"}]},{"given":"Zheng","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology Beijing University of Technology Beijing China"},{"name":"Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China"}]},{"given":"Jia","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Center of the State Administration for Market Regulation Beijing China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology Beijing University of Technology Beijing China"},{"name":"Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"issue":"10","key":"e_1_2_9_2_1","first-page":"1041","article-title":"Internet of Things: from Internet scale sensing to smart services","volume":"98","author":"Georgakopoulos D","year":"2016","journal-title":"Comput Secur"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_2_9_5_1","unstructured":"BassiD HornG Internet of Things in 2020 roadmap for the future[M\/OL] http:\/\/www.iotvisitthefuture.eu\/fileadmin\/documents\/researchforeurope\/270808_IoT_in_2020_Workshop_Report_V1\u20101.pdf."},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964552"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.018"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1316"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040019"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"issue":"2","key":"e_1_2_9_11_1","first-page":"263","article-title":"DEAL: differentially private auction for blockchain based microgrids energy trading","volume":"13","author":"Hassan M","year":"2020","journal-title":"IEEE Trans Serv Comput"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.060"},{"issue":"2","key":"e_1_2_9_13_1","first-page":"241","article-title":"BlockChain\u2010based identity authentication scheme for multi\u2010WSN","volume":"13","author":"Cui Z","year":"2020","journal-title":"IEEE Trans Serv Comput"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5478"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5464"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.038"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.08.010"},{"issue":"32","key":"e_1_2_9_18_1","first-page":"89","article-title":"ID\u2010based threshold group signature scheme without trustedparty","volume":"48","author":"Li H\u2010F","year":"2012","journal-title":"Comput Eng Appl"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.11.004"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0259-4"},{"issue":"1","key":"e_1_2_9_21_1","first-page":"61","article-title":"A new group signature scheme based on RSA assumption","volume":"42","author":"Yang C","year":"2013","journal-title":"Inf Technol Control"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0031-8"},{"key":"e_1_2_9_23_1","unstructured":"ChenTS HsiaoTC ChenTL.An efficient threshold group signature scheme. Paper presented at: Proceedings of the Tencon IEEERegion10 Conference. Chiang Mai Thailand; vol. 67 2004:13\u201016."},{"key":"e_1_2_9_24_1","volume-title":"Research on Theory and Application of Threshold Digital Signature","author":"Peng Y","year":"2010"},{"issue":"1","key":"e_1_2_9_25_1","first-page":"78","article-title":"Efficient dynamic threshold group signature scheme based on eliptic curve cryptosystem","volume":"16","author":"Xia X\u2010S","year":"2008","journal-title":"J Southwest Jiaotong Univ"},{"issue":"1","key":"e_1_2_9_26_1","first-page":"57","article-title":"A new threshold signature scheme based on eliptic curve cryptosystem","volume":"12","author":"Xie D","year":"2013","journal-title":"J Hang Zhou Normal Univ"},{"issue":"01","key":"e_1_2_9_27_1","first-page":"43","article-title":"Research on group signature with threshold value based on elliptic curve","volume":"38","author":"Jie Y","year":"2008","journal-title":"J Southeast Univ"},{"issue":"4","key":"e_1_2_9_28_1","first-page":"2713","article-title":"A study on efficient group\u2010oriented signature schemes for realistic application environment","volume":"8","author":"Chung YF","year":"2012","journal-title":"Int J Innovat Comput Inf Control"},{"key":"e_1_2_9_29_1","doi-asserted-by":"crossref","unstructured":"DahshanH KamalA RohiemA.A threshold blind digital signature scheme using eliptic curved log\u2010based cryptosystem. Paper presented at: Proceedings of the 81st Vehicular Technology Conference. Glasgow UK; 2015.","DOI":"10.1109\/VTCSpring.2015.7145653"},{"issue":"5","key":"e_1_2_9_30_1","first-page":"54","article-title":"Efficiency identity\u2010based threshold group signature scheme","volume":"40","author":"Iong\u2010Wei L","year":"2012","journal-title":"J Commun"},{"key":"e_1_2_9_31_1","volume-title":"Design and Implementation of Identity Authentication Scheme Based on Elliptic Curve Cryptography on WSN","author":"Lin Y\u2010B"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.6243","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.6243","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.6243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T14:13:01Z","timestamp":1693404781000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.6243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,4]]},"references-count":30,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,7,10]]}},"alternative-id":["10.1002\/cpe.6243"],"URL":"https:\/\/doi.org\/10.1002\/cpe.6243","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,4]]},"assertion":[{"value":"2020-12-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}