{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T01:56:16Z","timestamp":1761184576767,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535392"},{"type":"electronic","value":"9789819535408"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3540-8_7","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T13:33:15Z","timestamp":1761139995000},"page":"119-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Certificate-Based Quasi-linearly Homomorphic Signatures: Definition, Construction, and\u00a0Application to\u00a0Data Integrity Auditing"],"prefix":"10.1007","author":[{"given":"Jintao","family":"Cai","sequence":"first","affiliation":[]},{"given":"Futai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shaojun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yichi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452\u2013473. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"7_CR3","volume":"80","author":"J Chen","year":"2024","unstructured":"Chen, J., Zhou, T., Ji, S., Tan, H., Zheng, W.: Efficient public auditing scheme for non-administrator group with secure user revocation. J. Inf. Secur. Appl. 80, 103676 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1016\/j.proeng.2012.01.397","volume":"29","author":"L Cheng","year":"2012","unstructured":"Cheng, L., Xiao, Y., Wang, G.: Cryptanalysis of a certificate-based on signature scheme. Procedia Eng. 29, 2821\u20132825 (2012)","journal-title":"Procedia Eng."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Dewan, H., Hansdah, R.: A survey of cloud storage facilities. In: 2011 IEEE World Congress on Services, pp. 224\u2013231. IEEE (2011)","DOI":"10.1109\/SERVICES.2011.43"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 272\u2013293. Springer (2003)","DOI":"10.1007\/3-540-39200-9_17"},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"6673","DOI":"10.1109\/JIOT.2024.3491315","volume":"12","author":"X Hu","year":"2025","unstructured":"Hu, X., Chang, J., Ahmad, T., Zhang, F., Zhang, Y.: Identity-based integrity auditing scheme with sensitive information hiding for proxy-server-assisted cloud storage applications. IEEE Internet Things J. 12(6), 6673\u20136684 (2025)","journal-title":"IEEE Internet Things J."},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103181","volume":"128","author":"Y Huang","year":"2023","unstructured":"Huang, Y., Shen, W., Qin, J., Hou, H.: Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput. Secur. 128, 103181 (2023)","journal-title":"Comput. Secur."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski\u00a0Jr, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"issue":"13","key":"7_CR10","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1109\/JIOT.2021.3130291","volume":"9","author":"Y Li","year":"2021","unstructured":"Li, Y., Zhang, F.: An efficient certificate-based data integrity auditing protocol for cloud-assisted WBANs. IEEE Internet Things J. 9(13), 11513\u201311523 (2021)","journal-title":"IEEE Internet Things J."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Bao, F., Zhou, J.: Short and efficient certificate-based signature. In: International Conference on Research in Networking, pp. 167\u2013178. Springer (2011)","DOI":"10.1007\/978-3-642-23041-7_17"},{"issue":"2","key":"7_CR12","first-page":"481","volume":"85","author":"S Mitsunari","year":"2002","unstructured":"Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85(2), 481\u2013484 (2002)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology: Proceedings of CRYPTO 84 4, pp. 47\u201353. Springer (1985)","DOI":"10.1007\/3-540-39568-7_5"},{"issue":"6","key":"7_CR15","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TDSC.2022.3228699","volume":"20","author":"W Shen","year":"2023","unstructured":"Shen, W., Yu, J., Yang, M., Hu, J.: Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage. IEEE Trans. Dependable Secur. Comput. 20(6), 4593\u20134606 (2023)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"7_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107709","volume":"166","author":"H Tian","year":"2025","unstructured":"Tian, H., Gan, N., Peng, F., Quan, H., Chang, C., Vasilakos, A.V.: Smart contract-based public integrity auditing for cloud storage against malicious auditors. Future Gener. Comput. Syst. 166, 107709 (2025)","journal-title":"Future Gener. Comput. Syst."},{"issue":"13","key":"7_CR17","doi-asserted-by":"publisher","first-page":"1964","DOI":"10.3390\/math12131964","volume":"12","author":"Y Tian","year":"2024","unstructured":"Tian, Y., Zhou, X., Zhou, T., Zhong, W., Li, R., Yang, X.: A secure certificate-based data integrity auditing protocol with cloud service providers. Mathematics 12(13), 1964 (2024)","journal-title":"Mathematics"},{"issue":"1","key":"7_CR18","first-page":"7882662","volume":"2022","author":"W Wang","year":"2022","unstructured":"Wang, W., Sun, Y., Li, Y.: Security-enhanced certificate-based remote data integrity batch auditing for cloud-IoT. Secur. Commun. Netw. 2022(1), 7882662 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"7_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103244","volume":"154","author":"X Yang","year":"2024","unstructured":"Yang, X., Wei, L., Li, M., Du, X., Wang, C.: Backdoor-resistant certificateless-based message-locked integrity auditing for computing power network. J. Syst. Archit. 154, 103244 (2024)","journal-title":"J. Syst. Archit."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, F., Huang, Y., Yang, W., Tian, J.: Quasi-linearly homomorphic signature for data integrity auditing in cloud storage. In: Information Security and Cryptology, pp. 44\u201365. Springer, Singapore (2025)","DOI":"10.1007\/978-981-96-4734-7_3"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chang, J., Chen, Y., Xu, R.: Certificate-based remote auditing protocol with privacy protection and deduplication functions for cloud-assisted applications. Comput. Netw. 111083 (2025)","DOI":"10.1016\/j.comnet.2025.111083"},{"key":"7_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104096","volume":"148","author":"H Zhou","year":"2025","unstructured":"Zhou, H., Shen, W., Liu, J.: Certificate-based multi-copy cloud storage auditing supporting data dynamics. Comput. Secur. 148, 104096 (2025)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3540-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:03:22Z","timestamp":1761170602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3540-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9789819535392","9789819535408"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3540-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}