{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T12:48:48Z","timestamp":1748868528996},"reference-count":129,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10207-023-00678-y","type":"journal-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T05:02:32Z","timestamp":1679634152000},"page":"1055-1073","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A typology of secure multicast communication over 5\u00a0G\/6\u00a0G networks"],"prefix":"10.1007","volume":"22","author":[{"given":"Nizamud","family":"Din","sequence":"first","affiliation":[]},{"given":"Abdul","family":"Waheed","sequence":"additional","affiliation":[]},{"given":"Shamsher","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Noor Ul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,24]]},"reference":[{"issue":"9","key":"678_CR1","doi-asserted-by":"publisher","first-page":"1712","DOI":"10.1109\/TMC.2012.135","volume":"12","author":"M-H Park","year":"2012","unstructured":"Park, M.-H., Park, Y.-H., Jeong, H.-Y., Seo, S.-W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mob. Comput. 12(9), 1712\u20131723 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"678_CR2","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/COMST.2018.2880591","volume":"21","author":"D Striccoli","year":"2018","unstructured":"Striccoli, D., Piro, G., Boggia, G.: Multicast and broadcast services over mobile networks: A survey on standardized approaches and scientific outcomes. IEEE Commun. Surv. Tutor. 21(2), 1020\u20131063 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"678_CR3","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/COMST.2017.2776213","volume":"20","author":"S Islam","year":"2017","unstructured":"Islam, S., Muslim, N., Atwood, J.W.: A survey on multicasting in software-defined networking. IEEE Commun. Surv. Tutor. 20(1), 355\u2013387 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"678_CR4","doi-asserted-by":"publisher","first-page":"107282","DOI":"10.1016\/j.comnet.2020.107282","volume":"175","author":"AB Hassouna","year":"2020","unstructured":"Hassouna, A.B., Koubaa, H., Saidane, L.A.: Multi-user diversity wireless multicast: a survey. Comput. Netw. 175, 107282 (2020)","journal-title":"Comput. Netw."},{"issue":"10","key":"678_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/LWC.2020.3001119","volume":"9","author":"D Linsong","year":"2020","unstructured":"Linsong, D., Huang, C., Guo, W., Ma, J., Ma, X., Tang, Y.: Reconfigurable intelligent surfaces assisted secure multicast communications. IEEE Wirel. Commun. Lett. 9(10), 1673\u20131676 (2020)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"678_CR6","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TBC.2020.2977512","volume":"67","author":"S Pizzi","year":"2020","unstructured":"Pizzi, S., Suraci, C., Iera, A., Molinaro, A., Araniti, G.: A sidelink-aided approach for secure multicast service delivery: From human-oriented multimedia traffic to machine type communications. IEEE Trans. Broadcast. 67(1), 313\u2013323 (2020)","journal-title":"IEEE Trans. Broadcast."},{"issue":"4","key":"678_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5025","volume":"32","author":"S Sekar","year":"2020","unstructured":"Sekar, S., Latha, B.: Lightweight reliable and secure multicasting routing protocol based on cross-layer for manet. Concurr. Comput. Pract. Exper. 32(4), e5025 (2020)","journal-title":"Concurr. Comput. Pract. Exper."},{"issue":"1","key":"678_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.entcs.2006.11.009","volume":"171","author":"R Curtmola","year":"2007","unstructured":"Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1), 57\u201369 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"678_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: International Workshop on Information Security, pp. 291\u2013312. Springer, (1998)","DOI":"10.1007\/BFb0030430"},{"key":"678_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, Y..: Digital signcryption or how to achieve cost (signature & encryption)D$$\\ll $$ cost(signature)+cost (encryption). In: Annual International Cryptology Conference, pp. 165\u2013179. Springer, (1997)","DOI":"10.1007\/BFb0052234"},{"issue":"3","key":"678_CR11","doi-asserted-by":"publisher","first-page":"265","DOI":"10.4103\/0256-4602.81236","volume":"28","author":"Fagen Li and Muhammad Khurram Khan","year":"2011","unstructured":"Fagen Li and Muhammad Khurram Khan: A survey of identity-based signcryption. IETE Tech. Rev. 28(3), 265\u2013272 (2011)","journal-title":"IETE Tech. Rev."},{"key":"678_CR12","first-page":"6","volume":"102","author":"AK Singh","year":"2014","unstructured":"Singh, A.K.: A review of elliptic curve based signcryption schemes. Int. J. Comput. Appl. 102, 6 (2014)","journal-title":"Int. J. Comput. Appl."},{"issue":"5","key":"678_CR13","first-page":"969","volume":"18","author":"M Mandal","year":"2016","unstructured":"Mandal, M., Sharma, G., Verma, A.K.: Putational review of identity-based signcryption schemes. Int. J. Netw. Secur. 18(5), 969\u2013977 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"678_CR14","doi-asserted-by":"crossref","unstructured":"Ullah, S., Li, X.-Y., Zhang, L.: A review of signcryption schemes based on hyper elliptic curve. In: 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM), pp. 51\u201358. IEEE, (2017)","DOI":"10.1109\/BIGCOM.2017.51"},{"key":"678_CR15","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R.: Sufficient conditions for collision-resistant hashing. In: Theory of Cryptography Conference, pp. 445\u2013456. Springer, (2005)","DOI":"10.1007\/978-3-540-30576-7_24"},{"key":"678_CR16","doi-asserted-by":"crossref","unstructured":"Hsiao, C.-Y., Reyzin, L.: Finding collisions on a public road, or do secure hash functions need secret coins? In: Annual International Cryptology Conference, pp. 92\u2013105. Springer, (2004)","DOI":"10.1007\/978-3-540-28628-8_6"},{"key":"678_CR17","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, pp. 365\u2013390. (2022)","DOI":"10.1145\/3549993.3550007"},{"issue":"2","key":"678_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"678_CR19","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"23","key":"678_CR20","doi-asserted-by":"publisher","first-page":"13184","DOI":"10.3390\/su132313184","volume":"13","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Khan, M.A., Alkhalifah, A., Nordin, R., Alsharif, M.H., Alghtani, A.H., Aly, A.A.: A multi-message multi-receiver signcryption scheme with edge computing for secure and reliable wireless internet of medical things communications. Sustainability 13(23), 13184 (2021)","journal-title":"Sustainability"},{"key":"678_CR21","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, pp. 47\u201353. Springer, (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"678_CR22","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213\u2013229. Springer, (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"678_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102457","volume":"126","author":"Yu Xiaopeng","year":"2022","unstructured":"Xiaopeng, Yu., Zhao, W., Tang, D.: Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing. J. Syst. Archit. 126, 102457 (2022)","journal-title":"J. Syst. Archit."},{"key":"678_CR24","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452\u2013473. Springer, (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"678_CR25","doi-asserted-by":"crossref","unstructured":"Schaad, J., Ramsdell, B., Turner, S.: Secure\/multipurpose internet mail extensions (s\/mime) version 4.0 message specification. In: Technical Report, (2019)","DOI":"10.17487\/RFC8551"},{"key":"678_CR26","doi-asserted-by":"crossref","unstructured":"Kurosawa, K.: Multi-recipient public-key encryption with shortened ciphertext. In: International Workshop on Public Key Cryptography, pp. 48\u201363. Springer, (2002)","DOI":"10.1007\/3-540-45664-3_4"},{"key":"678_CR27","first-page":"85","volume":"2003","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Boldyreva, A., Staddon, J.: Multi-recipient encryption schemes: security notions and randomness re-use. PKC 2003, 85\u201399 (2003)","journal-title":"PKC"},{"issue":"11","key":"678_CR28","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.1109\/TIT.2007.907471","volume":"53","author":"M Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multi-recipient encryption schemes: efficient constructions and their security. IEEE Trans. Inf. Theory 53(11), 3927\u20133943 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"678_CR29","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Annual International Cryptology Conference, pp. 480\u2013491. Springer, (1993)","DOI":"10.1007\/3-540-48329-2_40"},{"key":"678_CR30","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H.M., Emarah, A.-A.M., Hagras, E.A.A.: Public key multi-message signcryption (pk-mms) scheme for secure communication systems. In: Fifth Annual Conference on Communication Networks and Services Research (CNSR\u201907), pp. 329\u2013334. IEEE, (2007)","DOI":"10.1109\/CNSR.2007.54"},{"key":"678_CR31","unstructured":"Elkamchouchi, H.M., Hagras, E.A.A.: Public key threshold multi-message signcryption (pk-tmms) scheme with (t, n) shared verification. In: 2009 National Radio Science Conference, pp. 1\u20139. IEEE, (2009)"},{"key":"678_CR32","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H.M., et al.: A new public key multi-message dynamic signcryption (pk-mm-ds) scheme for cryptographic transmission. In: 2007 National Radio Science Conference, pp. 1\u201310. IEEE, (2007)","DOI":"10.1109\/NRSC.2007.371399"},{"key":"678_CR33","doi-asserted-by":"crossref","unstructured":"Yavuz, A.A., et al.: Sat05-6: Nameps: n-tier satellite multicast security protocol based on signcryption schemes. In: IEEE Globecom 2006, pp. 1\u20136. IEEE, (2006)","DOI":"10.1109\/GLOCOM.2006.531"},{"key":"678_CR34","doi-asserted-by":"crossref","unstructured":"Han, Y., Yang, X., Hu, Y.: Signcryption based on elliptic curve and its multi-party schemes. In: Proceedings of the 3rd International Conference on Information Security, pp. 216\u2013217 (2004)","DOI":"10.1145\/1046290.1046336"},{"key":"678_CR35","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H.M., et al.: A new efficient public key multi-message multi-recipient signcryption (pk-mm-mrs) scheme for provable secure communications. In: 2007 International Conference on Computer Engineering & Systems, pp. 89\u201394. IEEE, (2007)","DOI":"10.1109\/ICCES.2007.4447031"},{"key":"678_CR36","doi-asserted-by":"crossref","unstructured":"Han, Y., Gui, X.: Multi-recipient signcryption for secure group communication. In: 2009 4th IEEE Conference on Industrial Electronics and Applications, pp. 161\u2013165. IEEE, (2009)","DOI":"10.1109\/ICIEA.2009.5138189"},{"key":"678_CR37","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H., et al.: A new efficient multiple broadcasters signcryption scheme (mbss) for secure distributed networks. In: 2009 Fifth International Conference on Networking and Services, pp. 204\u2013209. IEEE, (2009)","DOI":"10.1109\/ICNS.2009.102"},{"key":"678_CR38","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, HM., et al.: A new efficient publicly verifiable signcryption scheme and its multiple recipients variant for firewalls implementation. In: 2009 National Radio Science Conference, pp. 1\u20139. IEEE, (2009)","DOI":"10.1109\/IITA.2008.175"},{"key":"678_CR39","doi-asserted-by":"crossref","unstructured":"Ahmed, F., et al.: An efficient multi recipient signcryption scheme offering non repudiation. In: 2010 10th IEEE International Conference on Computer and Information Technology, pp. 1577\u20131581. IEEE, (2010)","DOI":"10.1109\/CIT.2010.280"},{"key":"678_CR40","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: New ecdsa-verifiable multi-receiver generalization signcryption. In: 2008 10th IEEE International Conference on High Performance Computing and Communications, pp. 1042\u20131047. IEEE, (2008)","DOI":"10.1109\/HPCC.2008.82"},{"issue":"5","key":"678_CR41","first-page":"432","volume":"14","author":"N Din","year":"2016","unstructured":"Din, N., et al.: An efficient generalization of multicast signcryption based on elliptic curve for firewalls. Int. J. Comput. Sci. Inf. Secur. 14(5), 432 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"issue":"12","key":"678_CR42","first-page":"1003","volume":"14","author":"I Ullah","year":"2016","unstructured":"Ullah, I., Khattak, H., Ullah, S., Khan, A., et al.: Multi receiver proxy signcrypion based on hyper elliptic curve cryptography. Int. J. Comput. Sci. Inf. Secur. 14(12), 1003 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"issue":"12","key":"678_CR43","first-page":"194","volume":"7","author":"A Sadat","year":"2017","unstructured":"Sadat, A., Ahmad, R., Ullah, I., Khattak, H., Ullah, S.: Multi receiver signcryption based on hyper elliptic curve cryptosystem. J. Appl. Environ. Biol. Sci. 7(12), 194\u2013200 (2017)","journal-title":"J. Appl. Environ. Biol. Sci."},{"key":"678_CR44","first-page":"5","volume":"9","author":"AU Rahman","year":"2018","unstructured":"Rahman, A.U., et al.: A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve. Int. J. Adv. Comput. Sci. Appl. 9, 5 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"678_CR45","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11859-006-0133-y","volume":"12","author":"F Li","year":"2007","unstructured":"Li, F., Yupu, H., Liu, S.: Efficient and provably secure multi-recipient signcryption from bilinear pairings. Wuhan Univ. J. Natl. Sci. 12(1), 17\u201320 (2007)","journal-title":"Wuhan Univ. J. Natl. Sci."},{"key":"678_CR46","unstructured":"Selvi, S., et al.: On the provable security of multi-receiver signcryption schemes. In: Cryptology ePrint Archive, (2008)"},{"key":"678_CR47","doi-asserted-by":"crossref","unstructured":"Han, Y., et al.: Parallel multi-recipient signcryption for multicast networks. In: 2010 Second International Workshop on Education Technology and Computer Science, vol.\u00a03, pp. 128\u2013131. IEEE, (2010)","DOI":"10.1109\/ETCS.2010.323"},{"key":"678_CR48","doi-asserted-by":"crossref","unstructured":"Han, Y., et al.: Multi-recipient signcryption for secure wireless group communication. Cryptology ePrint Archive, (2008)","DOI":"10.1109\/ICIEA.2009.5138189"},{"key":"678_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Q., He, M., Zheng, X.: Privacy-preserving communication for vehicular with multi receiver conditionally anonymous ring signcryption. In: 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control, pp. 496\u2013501. Atlantis Press, (2016)","DOI":"10.2991\/icmemtc-16.2016.96"},{"issue":"9","key":"678_CR50","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1002\/dac.1023","volume":"22","author":"Y Han","year":"2009","unstructured":"Han, Y., Gui, X.: Adaptive secure multicast in wireless networks. Int. J. Commun. Syst. 22(9), 1213\u20131239 (2009)","journal-title":"Int. J. Commun. Syst."},{"key":"678_CR51","unstructured":"Zhou, C.-x.: Cryptanalysis and improvement of a multi-receiver generalized signcryption scheme. In: Cryptology ePrint Archive, (2012)"},{"key":"678_CR52","doi-asserted-by":"crossref","unstructured":"Bohio, M., Miri, A.: An authenticated broadcasting scheme for wireless ad hoc network. In: Proceedings Second Annual Conference on Communication Networks and Services Research, 2004., pp. 69\u201374. IEEE, (2004)","DOI":"10.1109\/DNSR.2004.1344713"},{"key":"678_CR53","doi-asserted-by":"crossref","unstructured":"Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Australasian Conference on Information Security and Privacy, pp. 195\u2013206. Springer, (2006)","DOI":"10.1007\/11780656_17"},{"issue":"7","key":"678_CR54","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1093\/ietfec\/e91-a.7.1836","volume":"91","author":"C-H Tan","year":"2008","unstructured":"Tan, C.-H.: On the security of provably secure multi-receiver id-based signcryption scheme. IEICE Trans. Fundament. Electr. Commun. Comput. Scinces 91(7), 1836\u20131838 (2008)","journal-title":"IEICE Trans. Fundament. Electr. Commun. Comput. Scinces"},{"key":"678_CR55","doi-asserted-by":"crossref","unstructured":"Yu, Y., et al.: Efficient identity-based signcryption scheme for multiple receivers. In: International Conference on Autonomic and Trusted Computing, pp. 13\u201321. Springer, (2007)","DOI":"10.1007\/978-3-540-73547-2_4"},{"key":"678_CR56","unstructured":"Selvi, S., et al.: Cryptanalysis of id-based signcryption scheme for multiple receivers. Cryptology ePrint Archive, (2008)"},{"key":"678_CR57","unstructured":"Li, F., et al.: A new multi-receiver id-based signcryption scheme for group communications. In 2009 International Conference on Communications, Circuits and Systems, pp. 296\u2013300. IEEE, (2009)"},{"key":"678_CR58","doi-asserted-by":"crossref","unstructured":"Selvi, S, et al.: An efficient identity-based signcryption scheme for multiple receivers. In: International workshop on security, pp. 71\u201388. Springer, (2009)","DOI":"10.1007\/978-3-642-04846-3_6"},{"issue":"4","key":"678_CR59","first-page":"189","volume":"2","author":"S Khullar","year":"2013","unstructured":"Khullar, S., Richhariya, V., Richhariya, V.: An efficient identity based multi-receiver signcryption scheme using ecc. Int. J. Adv. Res. Technol. 2(4), 189\u2013193 (2013)","journal-title":"Int. J. Adv. Res. Technol."},{"issue":"11","key":"678_CR60","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1002\/sec.259","volume":"4","author":"H Qin","year":"2011","unstructured":"Qin, H., Dai, Y., Wang, Z.: Identity-based multi-receiver threshold signcryption scheme. Secur. Commun. Netw. 4(11), 1331\u20131337 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"678_CR61","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: On the security of id-based multi-receiver threshold signcryption scheme. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1944\u20131948. IEEE, (2012)","DOI":"10.1109\/CECNet.2012.6201568"},{"key":"678_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, B., Xu, Q.-L.: Identity-based multi-signcryption scheme without random oracles. J. Comput. Sci. (2010)","DOI":"10.3724\/SP.J.1016.2010.00103"},{"issue":"1","key":"678_CR63","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.comcom.2008.07.004","volume":"32","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Mao, J.: A novel identity-based multi-signcryption scheme. Comput. Commun. 32(1), 14\u201318 (2009)","journal-title":"Comput. Commun."},{"key":"678_CR64","doi-asserted-by":"crossref","unstructured":"Selvi, S., et al.: Breaking and fixing of an identity based multi-signcryption scheme. In: International Conference on Provable Security, pp. 61\u201375. Springer, (2009)","DOI":"10.1007\/978-3-642-04642-1_7"},{"key":"678_CR65","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H., Abouelseoud, Y.: A new multi-recipient tree-based signcryption scheme. In: 2007 International Conference on Computer Engineering & Systems, pp. 126\u2013130. IEEE, (2007)","DOI":"10.1109\/ICCES.2007.4447037"},{"key":"678_CR66","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H., Abouelseoud, Y.: A multi-recipient tree-based signcryption scheme. In: 2007 IEEE International Conference on Signal Processing and Communications, pp. 69\u201372. IEEE, (2007)","DOI":"10.1109\/ICSPC.2007.4728257"},{"key":"678_CR67","doi-asserted-by":"crossref","unstructured":"Naor, D., et al.: Revocation and tracing schemes for stateless receivers. In: Annual International Cryptology Conference, pp. 41\u201362. Springer, (2001)","DOI":"10.1007\/3-540-44647-8_3"},{"key":"678_CR68","unstructured":"Lal, S., Kushwah, P.: Anonymous id based signcryption scheme for multiple receivers. In: Cryptology ePrint Archive, (2009)"},{"key":"678_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, B., Xu, Q.: An id-based anonymous signcryption scheme for multiple receivers secure in the standard model. In: Advances in Computer Science and Information Technology, pp. 15\u201327. Springer, (2010)","DOI":"10.1007\/978-3-642-13577-4_2"},{"key":"678_CR70","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, Y., Qin, B.: Analysis and improvements of two identity based anonymous signcryption schemes for multiple receivers. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1057\u20131062. IEEE, (2012)","DOI":"10.1109\/TrustCom.2012.88"},{"key":"678_CR71","unstructured":"AN\u00a0ID-BASED MULTI-RECEIVER SIGNCRYPTION. Scheme in manet. J. Theor. Appl. Inf. Technol, 46(1), (2012)"},{"key":"678_CR72","doi-asserted-by":"crossref","unstructured":"Hien, D.T., et al.: An efficient identity-based broadcast signcryption scheme. In: 2010 Second International Conference on Knowledge and Systems Engineering, pp. 209\u2013216. IEEE, (2010)","DOI":"10.1109\/KSE.2010.17"},{"key":"678_CR73","unstructured":"Khullar, S., et al.: A survey of identity based multireceiver signcryption scheme. Int. J. Sci. Eng. Res. 4(4), (2013)"},{"key":"678_CR74","unstructured":"Zhou, C.: A multi-receiver id-based generalized signcryption scheme. In: Cryptology ePrint Archive, (2011)"},{"key":"678_CR75","first-page":"4","volume":"6","author":"T Singh","year":"2018","unstructured":"Singh, T., Ali, R.: An identity based multi-receiver generalized signcryption scheme. Asian J. Appl. Sci. 6, 4 (2018)","journal-title":"Asian J. Appl. Sci."},{"key":"678_CR76","doi-asserted-by":"crossref","unstructured":"Ming, Y., et al.: Multi-receiver identity-based signcryption scheme in the standard model. In: International Conference on Information Computing and Applications, pp. 487\u2013494. Springer, (2011)","DOI":"10.1007\/978-3-642-25255-6_62"},{"issue":"3","key":"678_CR77","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1049\/iet-ifs.2014.0360","volume":"9","author":"L Liaojun Pang","year":"2015","unstructured":"Liaojun Pang, L., Gao, H.L., Wang, Y.: Anonymous multi-receiver id-based signcryption scheme. IET Inf. Secur. 9(3), 194\u2013201 (2015)","journal-title":"IET Inf. Secur."},{"issue":"11","key":"678_CR78","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0166173","volume":"11","author":"L Pang","year":"2016","unstructured":"Pang, L., Yan, X., Zhao, H., Yufei, H., Li, H.: A novel multi-receiver signcryption scheme with complete anonymity. PloS one 11(11), e0166173 (2016)","journal-title":"PloS one"},{"key":"678_CR79","first-page":"5","volume":"23","author":"Z Yu","year":"2016","unstructured":"Yu, Z., Jing, Z., Yang, H., Gu, C.: A forward-secure multi-receiver signcryption scheme. J. Harbin Inst. Technol. 23, 5 (2016)","journal-title":"J. Harbin Inst. Technol."},{"key":"678_CR80","doi-asserted-by":"crossref","unstructured":"Chaudhari, P., Das, M.L.: Privacy preserving signcryption scheme. In: International Conference on Distributed Computing and Internet Technology, pp. 196\u2013209. Springer, (2017)","DOI":"10.1007\/978-3-319-50472-8_16"},{"issue":"1","key":"678_CR81","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1504\/IJESDF.2018.089202","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Chunxiang, X., Xue, J.: Efficient multi-receiver identity-based signcryption from lattice assumption. Int. J. Electr. Secur. Dig. Forens. 10(1), 20\u201338 (2018)","journal-title":"Int. J. Electr. Secur. Dig. Forens."},{"issue":"04","key":"678_CR82","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1142\/S0129054119400100","volume":"30","author":"F Rezaeibagha","year":"2019","unstructured":"Rezaeibagha, F., Yi, M., Zhang, S., Wang, X.: Provably secure (broadcast) homomorphic signcryption. Int. J. Found. Comput. Sci. 30(04), 511\u2013529 (2019)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"678_CR83","doi-asserted-by":"crossref","unstructured":"Selvi, S., et al.: Efficient and provably secure certificateless multi-receiver signcryption. In: International Conference on Provable Security, pp. 52\u201367. Springer, (2008)","DOI":"10.1007\/978-3-540-88733-1_4"},{"key":"678_CR84","unstructured":"Selvi, S., et al.: A note on the certificateless multi-receiver signcryption scheme. Cryptology ePrint Archive, (2009)"},{"key":"678_CR85","doi-asserted-by":"crossref","unstructured":"Miao, S., et al.: Cryptanalysis of a certificateless multi-receiver signcryption scheme. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 593\u2013597. IEEE, (2010)","DOI":"10.1109\/MINES.2010.130"},{"issue":"3","key":"678_CR86","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1080\/19393555.2017.1319523","volume":"26","author":"C Wang","year":"2017","unstructured":"Wang, C., Liu, C., Li, Y., Qiao, H., Chen, L.: Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks. Inf. Secur. J. Global Perspect. 26(3), 136\u2013152 (2017)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"678_CR87","first-page":"612","volume":"26","author":"EK Win","year":"2018","unstructured":"Win, E.K., Yoshihisa, T., Ishi, Y., Kawakami, T., Teranishi, Y., Shimojo, S.: Lightweight and secure certificateless multi-receiver encryption based on ecc. J. Inf. Process. 26, 612\u2013624 (2018)","journal-title":"J. Inf. Process."},{"key":"678_CR88","doi-asserted-by":"publisher","first-page":"78123","DOI":"10.1109\/ACCESS.2018.2884798","volume":"6","author":"L Pang","year":"2018","unstructured":"Pang, L., Kou, M., Wei, M., Li, H.: Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access 6, 78123\u201378135 (2018)","journal-title":"IEEE Access"},{"key":"678_CR89","doi-asserted-by":"publisher","first-page":"84091","DOI":"10.1109\/ACCESS.2019.2924654","volume":"7","author":"L Pang","year":"2019","unstructured":"Pang, L., Kou, M., Wei, M., Li, H.: Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE Access 7, 84091\u201384106 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"678_CR90","doi-asserted-by":"publisher","first-page":"6056","DOI":"10.1109\/JIOT.2019.2949708","volume":"7","author":"C Peng","year":"2019","unstructured":"Peng, C., Chen, J., Obaidat, M.S., Vijayakumar, P., He, D.: Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing. IEEE Internet Things J. 7(7), 6056\u20136068 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1\u20132","key":"678_CR91","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1051\/ita\/2019001","volume":"53","author":"R Gao","year":"2019","unstructured":"Gao, R., Zeng, J., Deng, L.: An efficient certificateless multi-receiver threshold decryption scheme. RAIRO-Theor. Inf. Appl. 53(1\u20132), 67\u201384 (2019)","journal-title":"RAIRO-Theor. Inf. Appl."},{"key":"678_CR92","doi-asserted-by":"crossref","unstructured":"Fu, M., et al.: Secure multi-receiver communications: Models, proofs, and implementation. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 689\u2013709. Springer, (2020)","DOI":"10.1007\/978-3-030-38991-8_45"},{"key":"678_CR93","doi-asserted-by":"publisher","first-page":"24511","DOI":"10.1109\/ACCESS.2019.2900072","volume":"7","author":"L Pang","year":"2019","unstructured":"Pang, L., Wei, M., Li, H.: Efficient and anonymous certificateless multi-message and multi-receiver signcryption scheme based on ecc. IEEE Access 7, 24511\u201324526 (2019)","journal-title":"IEEE Access"},{"key":"678_CR94","doi-asserted-by":"publisher","first-page":"106123","DOI":"10.1016\/j.ijepes.2020.106123","volume":"121","author":"B Wang","year":"2020","unstructured":"Wang, B., Rong, J., Zhang, S., Liu, L.: Research on data security of multicast transmission based on certificateless multi-recipient signcryption in ami. Int. J. Electr. Power Energy Syst. 121, 106123 (2020)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"4","key":"678_CR95","doi-asserted-by":"publisher","first-page":"177","DOI":"10.23919\/JCC.2022.04.014","volume":"19","author":"L Wang","year":"2022","unstructured":"Wang, L., Guan, Z., Chen, Z., Mingsheng, H.: Multi-receiver signcryption scheme with multiple key generation centers through public channel in edge computing. China Commun. 19(4), 177\u2013198 (2022)","journal-title":"China Commun."},{"key":"678_CR96","volume":"71","author":"H Li","year":"2022","unstructured":"Li, H., Chenhao, W., Pang, L.: Completely anonymous certificateless multi-receiver signcryption scheme with sender traceability. J. Inf. Secur. Appl. 71, 103384 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"678_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108995","volume":"211","author":"S Niu","year":"2022","unstructured":"Niu, S., Zhou, S., Fang, L., Ying, H., Wang, C.: Broadcast signcryption scheme based on certificateless in wireless sensor network. Comput. Netw. 211, 108995 (2022)","journal-title":"Comput. Netw."},{"issue":"2","key":"678_CR98","first-page":"196","volume":"17","author":"L Huixian","year":"2020","unstructured":"Huixian, L., Jin, G., Lingyun, W., Liaojun, P.: Mpkc-based threshold proxy signcryption scheme. Int. Arab J. Inf. Tech. 17(2), 196\u2013206 (2020)","journal-title":"Int. Arab J. Inf. Tech."},{"issue":"3","key":"678_CR99","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11432-010-0061-5","volume":"53","author":"YX Sun","year":"2010","unstructured":"Sun, Y.X., Li, H.: Efficient signcryption between tpkc and idpkc and its multi-receiver construction. Sci. China Inf. Sci. 53(3), 557\u2013566 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"678_CR100","doi-asserted-by":"crossref","unstructured":"Raveendranath, S., Aneesh, A.: Efficient multi-receiver heterogenous signcryption. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1693\u20131697. IEEE, (2016)","DOI":"10.1109\/WiSPNET.2016.7566428"},{"issue":"17","key":"678_CR101","doi-asserted-by":"publisher","first-page":"4574","DOI":"10.1002\/sec.1650","volume":"9","author":"Y Li","year":"2016","unstructured":"Li, Y., Wang, C., Zhang, Y., Niu, S.: Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Secur. Commun. Netw. 9(17), 4574\u20134584 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"9","key":"678_CR102","doi-asserted-by":"publisher","first-page":"e0184407","DOI":"10.1371\/journal.pone.0184407","volume":"12","author":"S Niu","year":"2017","unstructured":"Niu, S., Niu, L., Yang, X., Wang, C., Jia, X.: Heterogeneous hybrid signcryption for multi-message and multi-receiver. PloS one 12(9), e0184407 (2017)","journal-title":"PloS one"},{"issue":"3","key":"678_CR103","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1080\/19393555.2017.1319523","volume":"26","author":"C Wang","year":"2017","unstructured":"Wang, C., Liu, C., Li, Y., Qiao, H., Chen, L.: Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks. Inf. Secur. J. Global Perspect. 26(3), 136\u2013152 (2017)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"678_CR104","doi-asserted-by":"crossref","unstructured":"Niu, S., et al.: Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. In: International Conference on Cloud Computing and Security, pp. 216\u2013229. Springer, (2017)","DOI":"10.1007\/978-3-319-68542-7_18"},{"key":"678_CR105","doi-asserted-by":"publisher","first-page":"180205","DOI":"10.1109\/ACCESS.2019.2958089","volume":"7","author":"J Qiu","year":"2019","unstructured":"Qiu, J., Fan, K., Zhang, K., Pan, Q., Li, H., Yang, Y.: An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile iot. IEEE Access 7, 180205\u2013180217 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"678_CR106","first-page":"86","volume":"33","author":"RM Daniel","year":"2021","unstructured":"Daniel, R.M., Rajsingh, E.B., Silas, S.: A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. J. King Saud Univ. Comput. Inf. Sci. 33(1), 86\u201398 (2021)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"5","key":"678_CR107","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","volume":"74","author":"SA Ch","year":"2015","unstructured":"Ch, S.A., Sher, M., Ghani, A., Naqvi, H., Irshad, A., et al.: An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multim. Tools Appl. 74(5), 1711\u20131723 (2015)","journal-title":"Multim. Tools Appl."},{"key":"678_CR108","doi-asserted-by":"crossref","unstructured":"Yu, H., Ren, R.: Certificateless elliptic curve aggregate signcryption scheme. IEEE Syst. J. (2021)","DOI":"10.1109\/JSYST.2021.3096531"},{"issue":"2","key":"678_CR109","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s12083-020-01044-8","volume":"14","author":"S Ullah","year":"2021","unstructured":"Ullah, S., Din, N.: Blind signcryption scheme based on hyper elliptic curves cryptosystem. Peer-to-Peer Netw. Appl. 14(2), 917\u2013932 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"678_CR110","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.future.2020.11.025","volume":"117","author":"H Zhu","year":"2021","unstructured":"Zhu, H., Wang, Y., Wang, C., Cheng, X.: An efficient identity-based proxy signcryption using lattice. Fut. Gener. Comput. Syst. 117, 321\u2013327 (2021)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"678_CR111","doi-asserted-by":"publisher","first-page":"103515","DOI":"10.1016\/j.csi.2021.103515","volume":"76","author":"HQ Le","year":"2021","unstructured":"Le, H.Q., Duong, D.H., Roy, P.S., Susilo, W., Fukushima, K., Kiyomoto, S.: Lattice-based signcryption with equality test in standard model. Comput. Stand. Interf. 76, 103515 (2021)","journal-title":"Comput. Stand. Interf."},{"key":"678_CR112","unstructured":"Chatterjee, S., et al.: Signcryption in a quantum world. In: Cryptology ePrint Archive, (2020)"},{"issue":"2","key":"678_CR113","first-page":"2687","volume":"15","author":"Yu Huifang","year":"2020","unstructured":"Huifang, Yu., Bai, L., Hao, M., Wang, N.: Certificateless signcryption scheme from lattice. IEEE Syst. J. 15(2), 2687\u20132695 (2020)","journal-title":"IEEE Syst. J."},{"key":"678_CR114","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.future.2020.11.025","volume":"117","author":"H Zhu","year":"2021","unstructured":"Zhu, H., Wang, Y., Wang, C., Cheng, X.: An efficient identity-based proxy signcryption using lattice. Fut. Gener. Comput. Syst. 117, 321\u2013327 (2021)","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"3","key":"678_CR115","doi-asserted-by":"publisher","first-page":"3949","DOI":"10.1109\/JSYST.2019.2961476","volume":"14","author":"G Kumar","year":"2020","unstructured":"Kumar, G., et al.: A lattice signcrypted secured localization in wireless sensor networks. IEEE Syst. J. 14(3), 3949\u20133956 (2020)","journal-title":"IEEE Syst. J."},{"issue":"8","key":"678_CR116","doi-asserted-by":"publisher","first-page":"949","DOI":"10.3103\/S0146411620080301","volume":"54","author":"EN Shkorkina","year":"2020","unstructured":"Shkorkina, E.N., Aleksandrova, E.B.: Securing post-quantum resistance for quantum-protected communication systems. Autom. Contr. Comput. Sci. 54(8), 949\u2013951 (2020)","journal-title":"Autom. Contr. Comput. Sci."},{"key":"678_CR117","doi-asserted-by":"crossref","unstructured":"Luo, L., et al.: Splitcast: Optimizing multicast flows in reconfigurable datacenter networks. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2559\u20132568. IEEE, (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155246"},{"key":"678_CR118","doi-asserted-by":"publisher","first-page":"10443","DOI":"10.1109\/ACCESS.2020.3039040","volume":"9","author":"H Wang","year":"2020","unstructured":"Wang, H., Sui, G., Zhao, Y., Chen, K.: Efficient sse with forward id-privacy and authentication in the multi-data-owner settings. IEEE Access 9, 10443\u201310459 (2020)","journal-title":"IEEE Access"},{"key":"678_CR119","doi-asserted-by":"crossref","unstructured":"Ma, Y., et al.: Online nfv-enabled multicasting in mobile edge cloud networks. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 821\u2013830. IEEE, (2019)","DOI":"10.1109\/ICDCS.2019.00086"},{"key":"678_CR120","unstructured":"Huang, Q., et al.: Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud. IEEE Trans. Cloud Comput. (2021)"},{"issue":"9","key":"678_CR121","doi-asserted-by":"publisher","first-page":"8485","DOI":"10.1109\/JIOT.2020.2991107","volume":"7","author":"Y Qin","year":"2020","unstructured":"Qin, Y., Xia, Q., Xu, Z., Zhou, P., Galis, A., Rana, O.F., Ren, J., Wu, G.: Enabling multicast slices in edge networks. IEEE Int. Things J. 7(9), 8485\u20138501 (2020)","journal-title":"IEEE Int. Things J."},{"key":"678_CR122","doi-asserted-by":"crossref","unstructured":"Hussen, H.R., et al.: Stateless and predictive geographic multicast scheme in flying ad-hoc networks. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 685\u2013690. IEEE, (2017)","DOI":"10.1109\/ICUFN.2017.7993878"},{"key":"678_CR123","doi-asserted-by":"crossref","unstructured":"Li, J., Zhou, Y., Chen, H.: On the age of information for multicast transmission with hard deadlines in iot systems. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20136. IEEE, (2020)","DOI":"10.1109\/WCNC45663.2020.9120580"},{"issue":"9","key":"678_CR124","doi-asserted-by":"publisher","first-page":"8178","DOI":"10.1109\/JIOT.2020.2981144","volume":"7","author":"J Li","year":"2020","unstructured":"Li, J., Zhou, Y., Chen, H.: Age of information for multicast transmission with fixed and random deadlines in iot systems. IEEE Internet Things J. 7(9), 8178\u20138191 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"678_CR125","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/02564602.2017.1407681","volume":"36","author":"Subho Shankar Basu and Somanath Tripathy","year":"2019","unstructured":"Subho Shankar Basu and Somanath Tripathy: Securing multicast group communication in iot-enabled systems. IETE Tech. Rev. 36(1), 83\u201393 (2019)","journal-title":"IETE Tech. Rev."},{"issue":"7","key":"678_CR126","doi-asserted-by":"publisher","first-page":"4875","DOI":"10.1109\/TII.2021.3110193","volume":"18","author":"J Cui","year":"2021","unstructured":"Cui, J., Jie, L., Zhong, H., Zhang, Q., Chengjie, G., Liu, L.: Parallel key-insulated multiuser searchable encryption for industrial internet of things. IEEE Trans. Indus. Inf. 18(7), 4875\u20134883 (2021)","journal-title":"IEEE Trans. Indus. Inf."},{"issue":"2","key":"678_CR127","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MNET.2017.1600067NM","volume":"31","author":"G Araniti","year":"2017","unstructured":"Araniti, G., Condoluci, M., Scopelliti, P., Molinaro, A., Iera, A.: Multicasting over emerging 5g networks: Challenges and perspectives. IEEE Netw. 31(2), 80\u201389 (2017)","journal-title":"IEEE Netw."},{"key":"678_CR128","doi-asserted-by":"crossref","unstructured":"Nait-Hamoud, O., Kenaza, T., Challal, Y.: Certificateless public key systems aggregation: An enabling technique for 5g multi-domain security management and delegation. Comput. Netw. 199, 108443 (2021)","DOI":"10.1016\/j.comnet.2021.108443"},{"issue":"8","key":"678_CR129","volume":"32","author":"S Khasawneh","year":"2021","unstructured":"Khasawneh, S., Kadoch, M.: Ecs-cp-abe: a lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks. Trans. Emerg. Telecommun. Technol. 32(8), e4102 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00678-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00678-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00678-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T02:05:17Z","timestamp":1690337117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00678-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":129,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["678"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00678-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"24 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflict of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}