Computer Science ›› 2022, Vol. 49 ›› Issue (3): 329-337.doi: 10.11896/jsjkx.201200256
• Information Security • Previous Articles Next Articles
ZHANG Zhen-chao1, LIU Ya-li1,2, YIN Xin-chun1,3
CLC Number:
[1]YANG Y,WU L,YIN G,et al.A survey on security and privacy issues in Internet-of-Things[J].IEEE Internet of Things Journal,2017,4(5):1250-1258. [2]KHAN M A,SALAH K.IoT security:Review,blockchain solutions,and open challenges[J].Future Generation Computer Systems,2018,82:395-411. [3]LIN J,YU W,ZHANG N,et al.A survey on internet of things:architecture,enabling technologies,security and privacy,and applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142. [4]BELGUITH S,KAANICHE N,HAMMOUDEH M,et al.Proud:Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications[J].Future Generation Computer Systems,2020,111:899-918. [5]SHAMIR A.Identity-based cryptosystems and signature sche-mes[C]//Workshop on the Theory and Application of Cryptographic Techniques.Berlin:Springer,1985:47-53. [6]AL-RIYAMI S S,Paterson K G.Certificateless public key cryptography[C]//Advancesin Cryptology-ASIACRYPT’03.Berlin:Springer,2003:452-473. [7]BARBOSA M,FARSHIM P.Certificateless signcryption[C]//Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security.New York:ACM,2008:369-372. [8]LI F,HAN Y,JIN C.Certificateless online/offline signcryption for the Internet of Things[J].Wireless Networks,2017,23(1):145-158. [9]ULLAH I,AMIN N U,ZAREEI M,et al.A lightweight andprovable secured certificateless signcryption approach for crowdsourced IIoT applications[J].Symmetry,2019,11(11):1386. [10]LIU X,WANG Z,YE Y,et al.An efficient and practical certificateless signcryption scheme for wireless body area networks[J].Computer Communications,2020,162:169-178. [11]NIU S,NIU L,WANG C,et al.Certificateless generalized signcryption scheme in the standard model[J].Journal on Communications,2017,38(4):35-45. [12]ZHOU C.An improved lightweight certificateless generalizedsigncryption scheme for mobile-health system[J].International Journal of Distributed Sensor Networks,2019,15(1):1-16. [13]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].Internatio-nal Journal of Advanced Computer Science and Applications,2019,10(4):1-7. [14]ZHANG B,JIA Z,ZHAO C.An efficient certificateless genera-lized signcryption scheme[J].Security and Communication Networks,2018,2018(1):1-11. [15]MANDAL S,BERA B,SUTRALA A K,et al.Certificateless-signcryption-based three-factor user access control scheme for IoT environment[J].IEEE Internet of Things Journal,2020,7(4):3184-3197. [16]RASTEGARI P.On the security of some recently proposed certificateless signcryption schemes[C]//2020 17th International ISC Conference on Information Security and Cryptology (ISCISC).IEEE,2020:95-100. [17]KARATI A,FAN C,HSU R,et al.Provably secure and gene-ralized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices[J].IEEE Internet of Things Journal,2019,6(6):10431-10440. [18]LIU Z,HU Y,ZHANG X,et al.Certificateless signcryptionscheme in the standard model[J].Information Sciences,2010,180(3):452-464. [19]ZHOU C,ZHOU W,DONG X,et al.Provable certificatelessgeneralized signcryption scheme[J].Designs,Codes and Cryptography,2014,71(2):331-346. [20]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].InternationalJournal of Advanced Computer Science and Applications,2019,10(4):610-616. [21]MIAO S,ZHANG F,LI S,et al.On security of a certificateless signcryption scheme[J].Information Sciences,2013,232:475-481. [22]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].Internatio-nal Journal of Advanced Computer Science and Applications,2019,10(4):610-616. |
[1] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[2] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[3] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[4] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[5] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[6] | LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567. |
[7] | WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32. |
[8] | WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302. |
[9] | LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui. IoTGuardEye:A Web Attack Detection Method for IoT Services [J]. Computer Science, 2021, 48(2): 324-329. |
[10] | LIU Wei, RUAN Min-jie, SHE Wei, ZHANG Zhi-hong, TIAN Zhao. PBFT Optimized Consensus Algorithm for Internet of Things [J]. Computer Science, 2021, 48(11): 151-158. |
[11] | LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25. |
[12] | GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80. |
[13] | NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303. |
[14] | LIU Shuai, CHEN Jian-hua. Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network [J]. Computer Science, 2020, 47(9): 304-310. |
[15] | XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225. |
|