{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:31:48Z","timestamp":1766269908787,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:00:00Z","timestamp":1584489600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:00:00Z","timestamp":1584489600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902115","61932016","61972294"],"award-info":[{"award-number":["61902115","61932016","61972294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2018YFC1315404"],"award-info":[{"award-number":["2018YFC1315404"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10916-020-1527-7","type":"journal-article","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T12:17:46Z","timestamp":1584533866000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems"],"prefix":"10.1007","volume":"44","author":[{"given":"Zhiyan","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"1527_CR1","doi-asserted-by":"crossref","unstructured":"Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743\u2013748. IEEE","DOI":"10.1145\/1837274.1837463"},{"issue":"2","key":"1527_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303\u2013332, 1999","journal-title":"SIAM Rev."},{"key":"1527_CR3","doi-asserted-by":"crossref","unstructured":"Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics","DOI":"10.1117\/12.2319015"},{"key":"1527_CR4","doi-asserted-by":"crossref","unstructured":"Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100\u00d7 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365","DOI":"10.1073\/pnas.1402365111"},{"issue":"3","key":"1527_CR5","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1007\/s00145-017-9270-z","volume":"31","author":"V Lyubashevsky","year":"2018","unstructured":"Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774\u2013797, 2018","journal-title":"J. Cryptol."},{"issue":"6","key":"1527_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"1527_CR7","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1002\/sec.1105","volume":"8","author":"M Tian","year":"2015","unstructured":"Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575\u20131586, 2015","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"1527_CR8","first-page":"5190","volume":"10","author":"J Xie","year":"2016","unstructured":"Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190\u20135208, 2016","journal-title":"KSII Transactions on Internet & Information Systems"},{"issue":"2","key":"1527_CR9","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/s00145-017-9265-9","volume":"31","author":"S Bai","year":"2018","unstructured":"Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehl\u00e9 D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the r\u00e9nyi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610\u2013640, 2018","journal-title":"J. Cryptol."},{"key":"1527_CR10","doi-asserted-by":"crossref","unstructured":"Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17\u201361","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"1527_CR11","doi-asserted-by":"crossref","unstructured":"Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523\u2013552. Springer","DOI":"10.1007\/978-3-642-13190-5_27"},{"issue":"2","key":"1527_CR12","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2018.1700330","volume":"56","author":"Z Liu","year":"2018","unstructured":"Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158\u2013162, 2018","journal-title":"IEEE Commun. Mag."},{"key":"1527_CR13","doi-asserted-by":"crossref","unstructured":"Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99\u2013108. ACM","DOI":"10.1145\/237814.237838"},{"key":"1527_CR14","doi-asserted-by":"crossref","unstructured":"Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713\u2013715. Springer","DOI":"10.1007\/978-1-4419-5906-5_417"},{"key":"1527_CR15","doi-asserted-by":"crossref","unstructured":"Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112\u2013131. Springer","DOI":"10.1007\/BFb0052231"},{"key":"1527_CR16","doi-asserted-by":"crossref","unstructured":"Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211\u2013228. Springer","DOI":"10.1007\/3-540-44987-6_14"},{"key":"1527_CR17","doi-asserted-by":"crossref","unstructured":"Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers\u2019 track at the RSA conference, pp. 122\u2013140. Springer","DOI":"10.1007\/3-540-36563-X_9"},{"key":"1527_CR18","doi-asserted-by":"crossref","unstructured":"Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1\u201320. Springer","DOI":"10.1007\/3-540-45682-1_1"},{"key":"1527_CR19","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37\u201354. Springer","DOI":"10.1007\/978-3-540-78524-8_3"},{"key":"1527_CR20","doi-asserted-by":"crossref","unstructured":"Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197\u2013206. ACM","DOI":"10.1145\/1374376.1374407"},{"key":"1527_CR21","doi-asserted-by":"crossref","unstructured":"Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499\u2013517. Springer","DOI":"10.1007\/978-3-642-13013-7_29"},{"key":"1527_CR22","doi-asserted-by":"crossref","unstructured":"Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395\u2013412. Springer","DOI":"10.1007\/978-3-642-17373-8_23"},{"key":"1527_CR23","doi-asserted-by":"crossref","unstructured":"Laguillaumie F., Langlois A., Libert B., Stehl\u00e9 D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41\u201361. Springer","DOI":"10.1007\/978-3-642-42045-0_3"},{"key":"1527_CR24","doi-asserted-by":"crossref","unstructured":"Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1\u201316. Springer","DOI":"10.1007\/978-3-642-19379-8_1"},{"key":"1527_CR25","doi-asserted-by":"crossref","unstructured":"Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149\u2013168. Springer","DOI":"10.1007\/978-3-642-20465-4_10"},{"key":"1527_CR26","doi-asserted-by":"crossref","unstructured":"Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416\u2013432. Springer","DOI":"10.1007\/3-540-39200-9_26"},{"key":"1527_CR27","doi-asserted-by":"crossref","unstructured":"Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers\u2019 Track at the RSA Conference, pp. 341\u2013356. Springer","DOI":"10.1007\/978-3-319-29485-8_20"},{"issue":"1","key":"1527_CR28","first-page":"75","volume":"100","author":"I Lee","year":"2011","unstructured":"Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber\u2013physical systems. Proc. IEEE 100 (1): 75\u201390, 2011","journal-title":"Proc. IEEE"},{"issue":"1","key":"1527_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TDSC.2014.2312327","volume":"12","author":"R Mitchell","year":"2014","unstructured":"Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16\u201330, 2014","journal-title":"IEEE Trans. Depend. Secure Comput."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-020-1527-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-020-1527-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-020-1527-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,18]],"date-time":"2021-03-18T00:33:49Z","timestamp":1616027629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-020-1527-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,18]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["1527"],"URL":"https:\/\/doi.org\/10.1007\/s10916-020-1527-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2020,3,18]]},"assertion":[{"value":"24 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"92"}}