{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:18:14Z","timestamp":1760660294719,"version":"build-2065373602"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01120-1","type":"journal-article","created":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T09:14:02Z","timestamp":1756718042000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Scheme for Preventing Cache Poisoning Attack Against DNS Forwarders Based on Redactable Signature"],"prefix":"10.1007","volume":"24","author":[{"given":"Lang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Biao","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Jinhua","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"1120_CR1","first-page":"577","volume-title":"Poison over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Device","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Lu, C., Peng, J., Yang, Q., Zhou, D., Liu, B., Man, K., Hao, S., Duan, H., Qian, Z.: Poison over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Device, pp. 577\u2013593. USENIX Association, Boston, USA (2020)"},{"key":"1120_CR2","doi-asserted-by":"crossref","unstructured":"Man, K., Qian, Z., Wang, Z., Zheng, X., Duan, H.: In: CCS\u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security , pp. 1337\u20131350 (2020)","DOI":"10.1145\/3372297.3417280"},{"issue":"3","key":"1120_CR3","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A Survey of Man In The Middle Attacks. IEEE Communications Surveys & Tutorials 18(3), 2027 (2016). https:\/\/doi.org\/10.1109\/COMST.2016.2548426","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1120_CR4","first-page":"3165","volume-title":"in 30th USENIX Security Symposium (USENIX Security 21)","author":"P Jeitner","year":"2021","unstructured":"Jeitner, P., Shulman, H.: in 30th USENIX Security Symposium (USENIX Security 21), pp. 3165\u20133182. USENIX Association, Berkeley, USA (2021)"},{"key":"1120_CR5","doi-asserted-by":"publisher","unstructured":"Blacka, D., Weiler, S.: Clarifications and Implementation Notes for DNS Security (DNSSEC). RFC 6840 (2013). https:\/\/doi.org\/10.17487\/RFC6840. https:\/\/www.rfc-editor.org\/info\/rfc6840","DOI":"10.17487\/RFC6840"},{"key":"1120_CR6","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1007\/s11277-016-3681-2","volume":"94","author":"J Cao","year":"2017","unstructured":"Cao, J., Ma, M., Wang, X., Liu, H.: A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks. Wireless Pers. Commun. 94, 1263 (2017). https:\/\/doi.org\/10.1007\/s11277-016-3681-2","journal-title":"Wireless Pers. Commun."},{"key":"1120_CR7","doi-asserted-by":"publisher","unstructured":"Hoffman, P.E., McManus, P.: DNS Queries over HTTPS (DoH). RFC 8484 (2018). https:\/\/doi.org\/10.17487\/RFC8484. https:\/\/www.rfc-editor.org\/info\/rfc8484","DOI":"10.17487\/RFC8484"},{"key":"1120_CR8","doi-asserted-by":"publisher","unstructured":"Jin, Y., Tomoishi, M., Matsuura, S.: In: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), pp. 1\u20133 (2019). https:\/\/doi.org\/10.1109\/NCA.2019.8935025","DOI":"10.1109\/NCA.2019.8935025"},{"issue":"4","key":"1120_CR9","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1109\/TDSC.2022.3142331","volume":"19","author":"F Alharbi","year":"2022","unstructured":"Alharbi, F., Zhou, Y., Qian, F., Qian, Z., Abu-Ghazaleh, N.: DNS Poisoning of Operating System Caches: Attacks and Mitigations. IEEE Trans. Dependable Secure Comput. 19(4), 2851 (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3142331","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1120_CR10","doi-asserted-by":"publisher","unstructured":"Schomp, K., Allman, M., Rabinovich, M.: In: Proceedings of the 13th ACM Workshop on Hot Topics in Networks Association for Computing Machinery, New York, NY, USA, HotNets-XIII, pp. 1\u20137 (2014). https:\/\/doi.org\/10.1145\/2670518.2673881","DOI":"10.1145\/2670518.2673881"},{"key":"1120_CR11","unstructured":"Bernstein, D.J.: DNSCurve: usable security for DNS (2009). http:\/\/dnscurve.org\/"},{"key":"1120_CR12","doi-asserted-by":"publisher","unstructured":"Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., Hoffman, P.E.: Specification for DNS over Transport Layer Security (TLS). RFC 7858 (2016). https:\/\/doi.org\/10.17487\/RFC7858. https:\/\/www.rfc-editor.org\/info\/rfc7858","DOI":"10.17487\/RFC7858"},{"key":"1120_CR13","unstructured":"Sunahara, S., Jin, Y., Iida, K.: In: Proceedings of the 32nd International Telecommunication Networks and Applications Conference (ITNAC) , pp. 178\u2013180 (2022)"},{"key":"1120_CR14","doi-asserted-by":"publisher","unstructured":"Herzberg, A., Shulman, H.: In: Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS) , pp. 224\u2013232 (2013). https:\/\/doi.org\/10.1109\/CNS.2013.6682711","DOI":"10.1109\/CNS.2013.6682711"},{"key":"1120_CR15","doi-asserted-by":"publisher","unstructured":"Man, K., Zhou, X., Qian, Z.: In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security Association for Computing Machinery, New York, NY, USA, CCS\u201921, pp. 3400\u20133414 (2021). https:\/\/doi.org\/10.1145\/3460120.3486219","DOI":"10.1145\/3460120.3486219"},{"issue":"2","key":"1120_CR16","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TETC.2017.2754646","volume":"8","author":"J Ma","year":"2020","unstructured":"Ma, J., Liu, J., Huang, X., Xiang, Y., Wu, W.: Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 8(2), 291 (2020). https:\/\/doi.org\/10.1109\/TETC.2017.2754646","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"4","key":"1120_CR17","doi-asserted-by":"publisher","first-page":"5636","DOI":"10.1109\/JSYST.2023.3269597","volume":"17","author":"K Ma","year":"2023","unstructured":"Ma, K., Zhou, Y., Wang, Y., Dong, C., Xia, Z., Yang, B., Zhang, M.: An Efficient Certificateless Signature Scheme With Provably Security and Its Applications. IEEE Syst. J. 17(4), 5636 (2023). https:\/\/doi.org\/10.1109\/JSYST.2023.3269597","journal-title":"IEEE Syst. J."},{"key":"1120_CR18","doi-asserted-by":"publisher","unstructured":"Karchmer, M., Wigderson, A.: In: Proceedings of the 8th Annual Conference on Structure in Complexity Theory IEEE Computer Society, Los Alamitos, CA, USA, pp. 102\u2013111 (1993). https:\/\/doi.org\/10.1109\/SCT.1993.336536","DOI":"10.1109\/SCT.1993.336536"},{"key":"1120_CR19","doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: In: Proceedings of the 13th ACM Conference on Computer and Communications Security Association for Computing Machinery, New York, NY, USA, CCS \u201906, pp. 89\u201398 (2006). https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"issue":"4","key":"1120_CR20","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1093\/comjnl\/bxr097","volume":"55","author":"X Huang","year":"2011","unstructured":"Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4), 457 (2011). https:\/\/doi.org\/10.1093\/comjnl\/bxr097","journal-title":"Comput. J."},{"key":"1120_CR21","unstructured":"P\u00f6hls, H.C., Samelin, K., Posegga, J., De, H.: Length-hiding redactable signatures from one-way accumulators in O(n). Tech. Rep. MIP-1201, Faculty of Computer Science and Mathematics (FIM), University of Passau (2012)"},{"issue":"2","key":"1120_CR22","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/JSYST.2017.2668389","volume":"12","author":"KH Yeh","year":"2018","unstructured":"Yeh, K.H.: A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Syst. J. 12(2), 2027 (2018). https:\/\/doi.org\/10.1109\/JSYST.2017.2668389","journal-title":"IEEE Syst. J."},{"issue":"17","key":"1120_CR23","doi-asserted-by":"publisher","first-page":"e3796.1","DOI":"10.1002\/dac.3796","volume":"31","author":"L Deng","year":"2018","unstructured":"Deng, L., Yang, Y., Gao, R., Chen, Y.: Certificateless short signature scheme from pairing in the standard model. Int. J. Commun Syst 31(17), e3796.1 (2018). https:\/\/doi.org\/10.1002\/dac.3796","journal-title":"Int. J. Commun Syst"},{"key":"1120_CR24","unstructured":"Haber, S., Horne, W., Zhang, M.: Efficient transparent redactable signatures with a single signature invocation. Cryptology ePrint Archive, Paper 2016\/1165 (2016). https:\/\/eprint.iacr.org\/2016\/1165"},{"issue":"6","key":"1120_CR25","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10207-013-0198-5","volume":"12","author":"A Kundu","year":"2013","unstructured":"Kundu, A., Bertino, E.: Privacy-preserving authentication of trees and graphs. Int. J. Inf. Secur. 12(6), 467 (2013). https:\/\/doi.org\/10.1007\/s10207-013-0198-5","journal-title":"Int. J. Inf. Secur."},{"key":"1120_CR26","volume":"1314","author":"F Zuo","year":"2019","unstructured":"Zuo, F., Wang, Q., Cheng, P.: Identity-Based Redactable Lamport Signature Scheme. J. Phys: Conf. Ser. 1314, 012147 (2019)","journal-title":"J. Phys: Conf. Ser."},{"issue":"2","key":"1120_CR27","doi-asserted-by":"publisher","first-page":"103","DOI":"10.22667\/JISIS.2020.05.31.103","volume":"10","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., Hu, N., Zhang, C., Cheng, X.: DCG: A Client-side Protection Method for DNS Cache. J. Internet Serv. Inf. Secur. 10(2), 103 (2020). https:\/\/doi.org\/10.22667\/JISIS.2020.05.31.103","journal-title":"J. Internet Serv. Inf. Secur."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01120-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01120-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01120-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:39:07Z","timestamp":1760614747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01120-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1120"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01120-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,1]]},"assertion":[{"value":"24 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"198"}}