{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:58:44Z","timestamp":1774893524741,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802249"],"award-info":[{"award-number":["61802249"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936213"],"award-info":[{"award-number":["U1936213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872230"],"award-info":[{"award-number":["61872230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072207"],"award-info":[{"award-number":["62072207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11277-022-09809-5","type":"journal-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T11:02:41Z","timestamp":1655982161000},"page":"1577-1599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids"],"prefix":"10.1007","volume":"126","author":[{"given":"Huiwen","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-3281","authenticated-orcid":false,"given":"Liangliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yiyuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"9809_CR1","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2019.03.014","volume":"84","author":"S Sultan","year":"2019","unstructured":"Sultan, S. (2019). Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. Computers & Security, 84, 148\u2013165.","journal-title":"Computers & Security"},{"issue":"6","key":"9809_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on information theory, 22(6), 644\u2013654.","journal-title":"IEEE transactions on information theory"},{"key":"9809_CR3","doi-asserted-by":"crossref","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques (pp. 47\u201353). Springer.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"9809_CR4","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., Paterson, K. G. (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security (pp. 452\u2013473). Springer.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"9809_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques (pp. 416\u2013432). Springer.","DOI":"10.1007\/3-540-39200-9_26"},{"issue":"s2","key":"9809_CR6","first-page":"192","volume":"49","author":"T Yang","year":"2012","unstructured":"Yang, T., Kong, L., Hu, J., & Chen, Z. (2012). Survey on aggregate signature and its applications. Journal of Computer Research and Development, 49(s2), 192\u2013199.","journal-title":"Journal of Computer Research and Development"},{"key":"9809_CR7","unstructured":"Yu-wen, H.A.O. (2016) A novel authentication scheme on the internet of things based on aggregate signature. Computer and Modernization (6), 103 (2016)"},{"key":"9809_CR8","doi-asserted-by":"crossref","unstructured":"Rivest, R. L., Shamir, A., Tauman, Y. (2001) How to leak a secret. In International conference on the theory and application of cryptology and information security (pp. 552\u2013565). Springer.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"9809_CR9","doi-asserted-by":"crossref","unstructured":"Yang, X., Wu, W., Liu, J. K., Chen, X. (2015) Lightweight anonymous authentication for ad hoc group: A ring signature approach. In International conference on provable security (pp. 215\u2013226). Springer.","DOI":"10.1007\/978-3-319-26059-4_12"},{"key":"9809_CR10","doi-asserted-by":"crossref","unstructured":"Malina, L., Hajny, J., Dzurenda, P., Ricci, S. (2018) Lightweight ring signatures for decentralized privacy-preserving transactions. In ICETE (Vol. 2, pp. 692\u2013697).","DOI":"10.5220\/0006890505260531"},{"key":"9809_CR11","doi-asserted-by":"publisher","first-page":"23261","DOI":"10.1109\/ACCESS.2018.2827163","volume":"6","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Liu, X., Tang, C., Wang, J., & Zhang, L. (2018). Unlinkable coin mixing scheme for transaction privacy enhancement of bitcoin. IEEE Access, 6, 23261\u201323270.","journal-title":"IEEE Access"},{"key":"9809_CR12","doi-asserted-by":"publisher","first-page":"76765","DOI":"10.1109\/ACCESS.2020.2987831","volume":"8","author":"X Li","year":"2020","unstructured":"Li, X., Mei, Y., Gong, J., Xiang, F., & Sun, Z. (2020). A blockchain privacy protection scheme based on ring signature. IEEE Access, 8, 76765\u201376772.","journal-title":"IEEE Access"},{"key":"9809_CR13","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., Cepeda, R. (2010) Privacy for smart meters: Towards undetectable appliance load signatures. In 2010 first IEEE international conference on smart grid communications (pp. 232\u2013237). IEEE.","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"9809_CR14","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T. (2007) Pda: Privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications (pp. 2045\u20132053). IEEE.","DOI":"10.1109\/INFCOM.2007.237"},{"key":"9809_CR15","doi-asserted-by":"crossref","unstructured":"Groat, M.M., Hey, W., Forrest, S. (2011) Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In 2011 proceedings IEEE INFOCOM (pp. 2024\u20132032). IEEE.","DOI":"10.1109\/INFCOM.2011.5935010"},{"key":"9809_CR16","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access, 5, 3302\u20133312.","journal-title":"IEEE Access"},{"issue":"9","key":"9809_CR17","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TPDS.2019.2899097","volume":"30","author":"S Wang","year":"2019","unstructured":"Wang, S., Huang, L., Nie, Y., Zhang, X., Wang, P., Xu, H., & Yang, W. (2019). Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 30(9), 2046\u20132059.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"9809_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1587\/transinf.E95.D.67","volume":"95","author":"R Bista","year":"2012","unstructured":"Bista, R., Kim, Y.-K., Song, M.-S., & Chang, J.-W. (2012). Improving data confidentiality and integrity for data aggregation in wireless sensor networks. IEICE Transactions on Information and Systems, 95(1), 67\u201377.","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"15","key":"9809_CR19","doi-asserted-by":"publisher","first-page":"2494","DOI":"10.1002\/sec.1191","volume":"8","author":"C Li","year":"2015","unstructured":"Li, C., Lu, R., Li, H., Chen, L., & Chen, J. (2015). Pda: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Security and Communication Networks, 8(15), 2494\u20132506.","journal-title":"Security and Communication Networks"},{"issue":"5","key":"9809_CR20","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/JIOT.2020.2978286","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Zhao, Y., Wu, J., & Chen, B. (2020). Lvpda: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet of Things Journal, 7(5), 4016\u20134027.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"9809_CR21","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1504\/IJAHUC.2016.077203","volume":"22","author":"X Tan","year":"2016","unstructured":"Tan, X., Zheng, J., Zou, C., & Niu, Y. (2016). Pseudonym-based privacy-preserving scheme for data collection in smart grid. International Journal of Ad Hoc and Ubiquitous Computing, 22(2), 120\u2013127.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"9809_CR22","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on smart grid communications (pp 238\u2013243). IEEE.","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"issue":"6","key":"9809_CR23","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/S1007-0214(11)70084-0","volume":"16","author":"W Ren","year":"2011","unstructured":"Ren, W., Song, J., Yang, Y., & Ren, Y. (2011). Lightweight privacy-aware yet accountable secure scheme for sm-sgcc communications in smart grid. Tsinghua Science and Technology, 16(6), 640\u2013647.","journal-title":"Tsinghua Science and Technology"},{"issue":"05","key":"9809_CR24","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571\u2013588.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"9809_CR25","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman Advances in Proceedings of Crypto (Vol. 82). Plenum.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"3","key":"9809_CR26","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1002\/sec.761","volume":"7","author":"X Liu","year":"2014","unstructured":"Liu, X., Zhang, Y., Wang, B., & Wang, H. (2014). An anonymous data aggregation scheme for smart grid systems. Security and Communication Networks, 7(3), 602\u2013610.","journal-title":"Security and Communication Networks"},{"key":"9809_CR27","doi-asserted-by":"crossref","unstructured":"Cheung, J. C., Chim, T. W., Yiu, S. -M., Li, V. O., Hui, L. C. (2011). Credential-based privacy-preserving power request scheme for smart grid network. In 2011 IEEE global telecommunications conference-GLOBECOM (pp. 1\u20135). IEEE.","DOI":"10.1109\/GLOCOM.2011.6134566"},{"key":"9809_CR28","doi-asserted-by":"crossref","unstructured":"Chaum, D., Van\u00a0Heyst, E. (1991) Group signatures. In Workshop on the theory and application of of cryptographic techniques (pp. 257\u2013265). Springer.","DOI":"10.1007\/3-540-46416-6_22"},{"issue":"5","key":"9809_CR29","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992\u20138004.","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"9809_CR30","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","volume":"14","author":"A Karati","year":"2018","unstructured":"Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701\u20133711.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"9809_CR31","doi-asserted-by":"publisher","first-page":"106140","DOI":"10.1016\/j.ijepes.2020.106140","volume":"121","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Rong, J., & Wang, B. (2020). A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. International Journal of Electrical Power & Energy Systems, 121, 106140.","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"9809_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102669","volume":"55","author":"S Bouakkaz","year":"2020","unstructured":"Bouakkaz, S., & Semchedine, F. (2020). A certificateless ring signature scheme with batch verification for applications in vanet. Journal of Information Security and Applications, 55, 102669.","journal-title":"Journal of Information Security and Applications"},{"key":"9809_CR33","first-page":"80","volume":"18","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80\u201389.","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"6","key":"9809_CR34","doi-asserted-by":"publisher","first-page":"5256","DOI":"10.1109\/JIOT.2020.2979613","volume":"7","author":"J Liu","year":"2020","unstructured":"Liu, J., Wang, L., & Yu, Y. (2020). Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet of Things Journal, 7(6), 5256\u20135266.","journal-title":"IEEE Internet of Things Journal"},{"issue":"14","key":"9809_CR35","doi-asserted-by":"publisher","first-page":"3983","DOI":"10.3390\/s20143983","volume":"20","author":"D-H Lee","year":"2020","unstructured":"Lee, D.-H., Yim, K., & Lee, I.-Y. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.","journal-title":"Sensors"},{"key":"9809_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102905","volume":"61","author":"J Kar","year":"2021","unstructured":"Kar, J., Liu, X., & Li, F. (2021). Cl-ass: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. Journal of Information Security and Applications, 61, 102905.","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"9809_CR37","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","volume":"15","author":"Q Mei","year":"2020","unstructured":"Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., & Khan, M. K. (2020). Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1), 245\u2013256.","journal-title":"IEEE Systems Journal"},{"key":"9809_CR38","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.ins.2019.11.037","volume":"514","author":"G Wu","year":"2020","unstructured":"Wu, G., Zhang, F., Shen, L., Guo, F., & Susilo, W. (2020). Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences, 514, 288\u2013301.","journal-title":"Information Sciences"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09809-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T10:53:37Z","timestamp":1663671217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09809-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["9809"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09809-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"28 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}