{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:28:03Z","timestamp":1762338483597,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T00:00:00Z","timestamp":1658966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T00:00:00Z","timestamp":1658966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12083-022-01356-x","type":"journal-article","created":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T06:02:40Z","timestamp":1658988160000},"page":"2390-2403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7760-2902","authenticated-orcid":false,"given":"Medikonda Asha","family":"Kiran","sequence":"first","affiliation":[]},{"given":"Syam Kumar","family":"Pasupuleti","sequence":"additional","affiliation":[]},{"given":"R","family":"Eswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,28]]},"reference":[{"issue":"8","key":"1356_CR1","doi-asserted-by":"publisher","first-page":"3712","DOI":"10.1109\/TII.2017.2784395","volume":"14","author":"P Xu","year":"2017","unstructured":"Xu P, He S, Wang W, Susilo W, Jin H (2017) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Transactions on Industrial Informatics 14(8), 3712\u20133723","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"1356_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MCC.2018.111122026","volume":"5","author":"W Wang","year":"2018","unstructured":"Wang W, Xu P, Yang LT (2018) Secure data collection, storage and access in cloud-assisted iot. IEEE cloud computing 5(4):77\u201388","journal-title":"IEEE cloud computing"},{"key":"1356_CR3","doi-asserted-by":"crossref","unstructured":"Gagn\u00e9 M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption. In: International Conference on Security and Cryptography for Networks, Springer, pp 154\u2013171","DOI":"10.1007\/978-3-642-15317-4_11"},{"key":"1356_CR4","doi-asserted-by":"crossref","unstructured":"Wang C, Huang J (2011) Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: 2011 Seventh International Conference on Computational Intelligence and Security, IEEE, pp 905\u2013909","DOI":"10.1109\/CIS.2011.204"},{"key":"1356_CR5","doi-asserted-by":"crossref","unstructured":"Chen C, Chen J, Lim HW, Zhang Z, Feng D (2012) Combined public-key schemes: The case of abe and abs. In: International Conference on Provable Security, Springer, pp 53\u201369","DOI":"10.1007\/978-3-642-33272-2_5"},{"issue":"3","key":"1356_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJACT.2012.045589","volume":"2","author":"K Emura","year":"2012","unstructured":"Emura K, Miyaji A, Rahman MS (2012) Dynamic attribute-based signcryption without random oracles. Int J Appl Cryptogr 2(3):199\u2013211","journal-title":"Int J Appl Cryptogr"},{"key":"1356_CR7","doi-asserted-by":"crossref","unstructured":"Han Y, Lu W, Yang X (2013) Attribute-based signcryption scheme with non-monotonic access structure. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp 796\u2013802","DOI":"10.1109\/INCoS.2013.152"},{"key":"1356_CR8","doi-asserted-by":"crossref","unstructured":"Rao YS, Dutta R (2014) Expressive bandwidth-efficient attribute based signature and signcryption in standard model. In: Australasian Conference on Information Security and Privacy, Springer, pp 209\u2013225","DOI":"10.1007\/978-3-319-08344-5_14"},{"key":"1356_CR9","doi-asserted-by":"crossref","unstructured":"Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack. In: International Conference on Provable Security, Springer, pp 274\u2013290","DOI":"10.1007\/978-3-319-12475-9_19"},{"key":"1356_CR10","doi-asserted-by":"crossref","unstructured":"Hu C, Cheng X, Tian Z, Yu J, Akkaya K, Sun L (2015) An attribute-based signcryption scheme to secure attribute-defined multicast communications. In: International Conference on Security and Privacy in Communication Systems, Springer, pp 418\u2013437","DOI":"10.1007\/978-3-319-28865-9_23"},{"key":"1356_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption. Future Generation Computer Systems 52:67\u201376","journal-title":"Future Generation Computer Systems"},{"key":"1356_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"YS Rao","year":"2017","unstructured":"Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems 67:133\u2013151","journal-title":"Future Generation Computer Systems"},{"key":"1356_CR13","doi-asserted-by":"crossref","unstructured":"Belguith S, Kaaniche N, Mohamed M, Russello G (2018) C-absc: cooperative attribute based signcryption scheme for internet of things applications. In: 2018 IEEE International Conference on Services Computing (SCC), IEEE, pp 245\u2013248","DOI":"10.1109\/SCC.2018.00040"},{"key":"1356_CR14","first-page":"1025","volume-title":"2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber","author":"A Alsharif","year":"2019","unstructured":"Alsharif A, Shafee A, Nabil M, Mahmoud M, Alasmary W (2019) A multi-authority attribute-based signcryption scheme with efficient revocation for smart grid downlink communication. In: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp 1025\u20131032"},{"issue":"8","key":"1356_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4102","volume":"32","author":"S Khasawneh","year":"2021","unstructured":"Khasawneh S, Kadoch M (2021) Ecs-cp-abe: A lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks. Transactions on Emerging Telecommunications Technologies 32(8):e4102","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"1356_CR16","doi-asserted-by":"crossref","unstructured":"Zheng Y (1997) Digital signcryption or how to achieve cost. In: Annual international cryptology conference, Springer, pp 165\u2013179","DOI":"10.1007\/BFb0052234"},{"key":"1356_CR17","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"1356_CR18","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, Springer, pp 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1356_CR19","doi-asserted-by":"crossref","unstructured":"Li J, Huang Q, Chen X, Chow SS, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp 386\u2013390","DOI":"10.1145\/1966913.1966964"},{"key":"1356_CR20","doi-asserted-by":"crossref","unstructured":"Liang K, Fang L, Susilo W, Wong DS (2013) A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp 552\u2013559","DOI":"10.1109\/INCoS.2013.103"},{"key":"1356_CR21","first-page":"328","volume":"2008","author":"HK Maji","year":"2008","unstructured":"Maji HK, Prabhakaran M, Rosulek M (2008) Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. IACR Cryptol ePrint Arch 2008:328","journal-title":"IACR Cryptol ePrint Arch"},{"key":"1356_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Future Generation Computer Systems 49:104\u2013112","journal-title":"Future Generation Computer Systems"},{"issue":"8","key":"1356_CR23","doi-asserted-by":"publisher","first-page":"686","DOI":"10.3390\/math7080686","volume":"7","author":"I Ullah","year":"2019","unstructured":"Ullah I, Amin NU, Khan J, Rehan M, Naeem M, Khattak H, Khattak SJ, Ali H (2019) A novel provable secured signcryption scheme????: A hyper-elliptic curve-based approach. Mathematics 7(8):686","journal-title":"Mathematics"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01356-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01356-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01356-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T07:28:32Z","timestamp":1661412512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01356-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,28]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["1356"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01356-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,7,28]]},"assertion":[{"value":"24 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}