{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:12Z","timestamp":1772119932033,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862042"],"award-info":[{"award-number":["61862042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11277-023-10322-6","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T11:02:51Z","timestamp":1679310171000},"page":"1107-1122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cross Domain Heterogeneous Signcryption Scheme with Equality Test for WBAN"],"prefix":"10.1007","volume":"130","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yusi","family":"Pei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minrong","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,3,20]]},"reference":[{"issue":"1","key":"10322_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MNET.103.2000761","volume":"36","author":"B Cornet","year":"2022","unstructured":"Cornet, B., Fang, H., & Ngo, H. (2022). An overview of wireless body area networks for mobile health applications. IEEE Network, 36(1), 76\u201382.","journal-title":"IEEE Network"},{"issue":"4","key":"10322_CR2","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10776-021-00538-3","volume":"28","author":"JV Ananthi","year":"2021","unstructured":"Ananthi, J. V., & Jose, P. (2021). A perspective review of security challenges in body area networks for healthcare applications. International Journal of Wireless Information Networks, 28(4), 451\u2013466.","journal-title":"International Journal of Wireless Information Networks"},{"issue":"3","key":"10322_CR3","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1007\/s11276-021-02560-y","volume":"27","author":"M Azees","year":"2021","unstructured":"Azees, M., Vijayakumar, P., & Karuppiah, M. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 27(3), 2119\u20132130.","journal-title":"Wireless Networks"},{"key":"10322_CR4","first-page":"1","volume":"27","author":"Q Cheng","year":"2021","unstructured":"Cheng, Q., Li, Y., & Shi, W. (2021). A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Networks and Applications, 27, 1\u201311.","journal-title":"Mobile Networks and Applications"},{"key":"10322_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13369-021-05707-3","volume":"46","author":"B Narwal","year":"2021","unstructured":"Narwal, B., & Mohapatra, A. K. (2021). SAMAKA: Secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arabian Journal for Science and Engineering, 46, 1\u201323.","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10322_CR6","doi-asserted-by":"publisher","first-page":"102705","DOI":"10.1016\/j.jisa.2020.102705","volume":"58","author":"S Izza","year":"2021","unstructured":"Izza, S., Benssalah, M., & Drouiche, K. (2021). An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. Journal of Information Security and Applications, 58, 102705.","journal-title":"Journal of Information Security and Applications"},{"key":"10322_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., & Ostrovsky, R. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506\u2013522).","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"10322_CR8","doi-asserted-by":"crossref","unstructured":"Yang, G., Tan, C. H., & Huang, Q. (2010). Probabilistic public key encryption with equality test. In Cryptographers\u2019 track at the RSA conference (pp. 119\u2013131).","DOI":"10.1007\/978-3-642-11925-5_9"},{"issue":"1","key":"10322_CR9","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11036-019-01215-9","volume":"25","author":"M Ramadan","year":"2020","unstructured":"Ramadan, M., Liao, Y., & Li, F. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223\u2013233.","journal-title":"Mobile Networks and Applications"},{"key":"10322_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)\u226a cost (signature) + cost (encryption). In Annual international cryptology conference (pp. 165\u2013179).","DOI":"10.1007\/BFb0052234"},{"key":"10322_CR11","doi-asserted-by":"publisher","first-page":"100264","DOI":"10.1016\/j.vehcom.2020.100264","volume":"26","author":"H Xiong","year":"2020","unstructured":"Xiong, H., Hou, Y., & Huang, X. (2020). Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Vehicular Communications, 26, 100264.","journal-title":"Vehicular Communications"},{"issue":"8","key":"10322_CR12","doi-asserted-by":"publisher","first-page":"e4190","DOI":"10.1002\/ett.4190","volume":"32","author":"Y Hou","year":"2021","unstructured":"Hou, Y., Huang, X., & Chen, Y. (2021). Heterogeneous signcryption scheme supporting equality test from PKI to CLC toward IoT. Transactions on Emerging Telecommunications Technologies, 32(8), e4190.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10322_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008955","author":"H Xiong","year":"2020","unstructured":"Xiong, H., Zhao, Y., & Hou, Y. (2020). Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3008955","journal-title":"IEEE Internet of Things Journal"},{"key":"10322_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3174716","author":"W Li","year":"2022","unstructured":"Li, W., Xia, C., & Wang, C. (2022). Secure and temporary access delegation with equality test for cloud-assisted IoV. IEEE Transactions on Intelligent Transportation Systems. https:\/\/doi.org\/10.1109\/TITS.2022.3174716","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"8","key":"10322_CR15","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1093\/comjnl\/bxaa144","volume":"64","author":"H Lin","year":"2021","unstructured":"Lin, H., Zhao, Z., & Gao, F. (2021). Lightweight public key encryption with equality test supporting partial authorization in cloud storage. The Computer Journal, 64(8), 1226\u20131238.","journal-title":"The Computer Journal"},{"issue":"4","key":"10322_CR16","doi-asserted-by":"publisher","first-page":"e4202","DOI":"10.1002\/ett.4202","volume":"33","author":"GG Deverajan","year":"2022","unstructured":"Deverajan, G. G., Muthukumaran, V., & Hsu, C. H. (2022). Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Transactions on Emerging Telecommunications Technologies, 33(4), e4202.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10322_CR17","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.comcom.2021.02.006","volume":"170","author":"XJ Lin","year":"2021","unstructured":"Lin, X. J., Sun, L., & Qu, H. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190\u2013199.","journal-title":"Computer Communications"},{"key":"10322_CR18","doi-asserted-by":"publisher","first-page":"e4361","DOI":"10.1002\/ett.4361","volume":"32","author":"A Hassan","year":"2021","unstructured":"Hassan, A., Elhabob, R., & Eltayieb, N. (2021). An authorized equality test on identity-based cryptosystem for mobile social networking applications. Transactions on Emerging Telecommunications Technologies, 32, e4361.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"6","key":"10322_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-020-9396-2","volume":"15","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Wang, M., & Zhong, H. (2021). IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers of Computer Science, 15(6), 1\u20133.","journal-title":"Frontiers of Computer Science"},{"issue":"3","key":"10322_CR20","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s12652-019-01365-4","volume":"11","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., & Sella, I. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065\u20131083.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"10322_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00436-0","volume":"2","author":"S Alornyo","year":"2021","unstructured":"Alornyo, S., Mohammed, M. A., & Anibrika, B. S. (2021). ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Computer Science, 2(1), 1\u20139.","journal-title":"SN Computer Science"},{"key":"10322_CR22","doi-asserted-by":"publisher","first-page":"103515","DOI":"10.1016\/j.csi.2021.103515","volume":"76","author":"HQ Le","year":"2021","unstructured":"Le, H. Q., Duong, D. H., & Roy, P. S. (2021). Lattice-based signcryption with equality test in standard model. Computer Standards & Interfaces, 76, 103515.","journal-title":"Computer Standards & Interfaces"},{"key":"10322_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3048972","author":"H Xiong","year":"2021","unstructured":"Xiong, H., Hou, Y., & Huang, X. (2021). Heterogeneous signcryption scheme from IBC to PKI with equality test for WBAN. IEEE Systems Journal. https:\/\/doi.org\/10.1109\/JSYST.2020.3048972","journal-title":"IEEE Systems Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10322-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10322-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10322-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T18:28:23Z","timestamp":1683743303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10322-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,20]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10322"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10322-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1928854\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,20]]},"assertion":[{"value":"15 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to Participate"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}