{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T16:21:35Z","timestamp":1776788495406,"version":"3.51.2"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62262041"],"award-info":[{"award-number":["62262041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12083-023-01579-6","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T15:02:26Z","timestamp":1698764546000},"page":"125-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption"],"prefix":"10.1007","volume":"17","author":[{"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinhuang","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minrong","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"issue":"4","key":"1579_CR1","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2011","unstructured":"Fang X, Misra S, Xue G et al (2011) Smart grid\u2014the new and improved power grid: a survey. EEE Commun Surv Tutor 14(4):944\u2013980","journal-title":"EEE Commun Surv Tutor"},{"issue":"1","key":"1579_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2010.49","volume":"8","author":"H Khurana","year":"2010","unstructured":"Khurana H, Hadley M, Lu N et al (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81\u201385","journal-title":"IEEE Secur Priv"},{"key":"1579_CR3","doi-asserted-by":"crossref","unstructured":"Chim TW, Yiu SM, Hui LC et\u00a0al (2011) Pass: privacy-preserving authentication scheme for smart grid network. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, pp 196\u2013201","DOI":"10.1109\/SmartGridComm.2011.6102316"},{"issue":"7","key":"1579_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2018.1700401","volume":"56","author":"Z Guan","year":"2018","unstructured":"Guan Z, Si G, Zhang X et al (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 56(7):82\u201388","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1579_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1504\/IJAHUC.2016.077203","volume":"22","author":"X Tan","year":"2016","unstructured":"Tan X, Zheng J, Zou C et al (2016) Pseudonym-based privacy-preserving scheme for data collection in smart grid. Int J Ad Hoc Ubiquitous Comput 22(2):120\u2013127","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"issue":"16","key":"1579_CR6","doi-asserted-by":"publisher","first-page":"17430","DOI":"10.1109\/JSEN.2020.3017695","volume":"21","author":"J Song","year":"2020","unstructured":"Song J, Zhong Q, Wang W et al (2020) FPDP: flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens J 21(16):17430\u201317438","journal-title":"IEEE Sens J"},{"issue":"3","key":"1579_CR7","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guo W, Fan CI et al (2018) A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans Industr Inf 15(3):1767\u20131774","journal-title":"IEEE Trans Industr Inf"},{"key":"1579_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-018-9451-y","volume":"62","author":"Z Guan","year":"2019","unstructured":"Guan Z, Zhang Y, Zhu L et al (2019) Effect: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. SCIENCE CHINA Inf Sci 62:1\u201314","journal-title":"SCIENCE CHINA Inf Sci"},{"issue":"3","key":"1579_CR9","first-page":"1","volume":"17","author":"J Wang","year":"2021","unstructured":"Wang J, Wu L, Zeadally S et al (2021) Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid. ACM Transactions on Sensor Networks (TOSN) 17(3):1\u201325","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"2","key":"1579_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.53106\/199115992022043302016","volume":"33","author":"N Cui","year":"2022","unstructured":"Cui N, Mu H (2022) Conditional privacy protection scheme based on blockchain and ring signcryption in Vanets. J Comput 33(2):177\u2013188","journal-title":"J Comput"},{"issue":"9","key":"1579_CR11","doi-asserted-by":"publisher","first-page":"10001","DOI":"10.1109\/TVT.2022.3179371","volume":"71","author":"M Luo","year":"2022","unstructured":"Luo M, Zhou Y (2022) An efficient conditional privacy-preserving authentication protocol based on generalized ring signcryption for Vanets. IEEE Trans Veh Technol 71(9):10001\u201310015","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"1579_CR12","doi-asserted-by":"publisher","first-page":"11266","DOI":"10.1109\/TVT.2020.3008781","volume":"69","author":"I Ali","year":"2020","unstructured":"Ali I, Lawrence T, Omala AA et al (2020) An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in vanets. IEEE Trans Veh Technol 69(10):11266\u201311280","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"1579_CR13","first-page":"2827","volume":"15","author":"Y Dai","year":"2021","unstructured":"Dai Y, Weng J, Yang A et al (2021) A lightweight and privacy-preserving answer collection scheme for mobile crowdsourcing. KSII Trans Internet Inf Syst (TIIS) 15(8):2827\u20132848","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"3","key":"1579_CR14","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1007\/s12083-022-01303-w","volume":"15","author":"C Lai","year":"2022","unstructured":"Lai C, Ma Z, Guo R et al (2022) Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer Peer Netw Appl 15(3):1562\u20131576","journal-title":"Peer Peer Netw Appl"},{"key":"1579_CR15","doi-asserted-by":"crossref","unstructured":"Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) $$\\ll$$ cost (signature)+ cost (encryption). In: Annual international cryptology conference. Springer, pp 165\u2013179","DOI":"10.1007\/BFb0052234"},{"key":"1579_CR16","unstructured":"Huang X, Susilo W, Mu Y et\u00a0al (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: 19th International Conference on Advanced Information Networking and Applications (AINA\u201905) Volume 1 (AINA papers). IEEE, pp 649\u2013654"},{"key":"1579_CR17","unstructured":"Baek J, Newmarch J, Safavi-Naini R, et\u00a0al (2004) A survey of identity-based cryptography. In: Proc. of Australian Unix Users Group Annual Conference, pp 95\u2013102"},{"issue":"3","key":"1579_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S1363-4127(03)00308-X","volume":"8","author":"KG Paterson","year":"2003","unstructured":"Paterson KG, Price G (2003) A comparison between traditional public key infrastructures and identity-based cryptography. Inf Secur Tech Rep 8(3):57\u201372","journal-title":"Inf Secur Tech Rep"},{"key":"1579_CR19","unstructured":"Joye M, Neven G (2009) Identity-based cryptography, vol\u00a02. IOS press"},{"key":"1579_CR20","doi-asserted-by":"crossref","unstructured":"Zhang F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: International conference on the theory and application of cryptology and information security. Springer, pp 533\u2013547","DOI":"10.1007\/3-540-36178-2_33"},{"issue":"12","key":"1579_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-020-2997-0","volume":"64","author":"J Chang","year":"2021","unstructured":"Chang J, Shao B, Ji Y et al (2021) Secure network coding from secure proof of retrievability. Science China Inf Sci 64(12):1\u20132","journal-title":"Science China Inf Sci"},{"key":"1579_CR22","doi-asserted-by":"publisher","first-page":"17833","DOI":"10.1109\/ACCESS.2020.2967904","volume":"8","author":"J Chang","year":"2020","unstructured":"Chang J, Wang H, Wang F et al (2020) RKA security for identity-based signature scheme. IEEE Access 8:17833\u201317841","journal-title":"IEEE Access"},{"key":"1579_CR23","unstructured":"Lin CY, Wu TC (2004) An identity-based ring signature scheme from bilinear pairings. In: 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004. IEEE, pp 182\u2013185"},{"key":"1579_CR24","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"6","key":"1579_CR25","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1016\/j.csi.2008.09.023","volume":"31","author":"Z Zhu","year":"2009","unstructured":"Zhu Z, Zhang Y, Wang F (2009) An efficient and provable secure identity-based ring signcryption scheme. Comput Stand Interfaces 31(6):1092\u20131097","journal-title":"Comput Stand Interfaces"},{"key":"1579_CR26","doi-asserted-by":"crossref","unstructured":"Sharmila Deva\u00a0Selvi S, Sree\u00a0Vivek S, Pandu\u00a0Rangan C (2009) On the security of identity based ring signcryption schemes. In: International Conference on Information Security. Springer, pp 310\u2013325","DOI":"10.1007\/978-3-642-04474-8_25"},{"issue":"6","key":"1579_CR27","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1002\/sec.614","volume":"6","author":"Z Guo","year":"2013","unstructured":"Guo Z, Li M, Fan X (2013) Attribute-based ring signcryption scheme. Secur Commun Netw 6(6):790\u2013796","journal-title":"Secur Commun Netw"},{"issue":"1","key":"1579_CR28","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/JSYST.2016.2557850","volume":"12","author":"F Li","year":"2016","unstructured":"Li F, Han Y, Jin C (2016) Cost-effective and anonymous access control for wireless body area networks. IEEE Syst J 12(1):747\u2013758","journal-title":"IEEE Syst J"},{"issue":"6","key":"1579_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0964-z","volume":"42","author":"AA Omala","year":"2018","unstructured":"Omala AA, Mbandu AS, Mutiria KD et al (2018) Provably secure heterogeneous access control scheme for wireless body area network. J Med Syst 42(6):1\u201314","journal-title":"J Med Syst"},{"issue":"1","key":"1579_CR30","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11277-019-06576-8","volume":"109","author":"M Luo","year":"2019","unstructured":"Luo M, Wen Y, Hu X (2019) Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment. Wireless Pers Commun 109(1):505\u2013519","journal-title":"Wireless Pers Commun"},{"key":"1579_CR31","doi-asserted-by":"crossref","unstructured":"Fujisaki E, Suzuki K (2007) Traceable ring signature. In: International Workshop on Public Key Cryptography. Springer, pp 181\u2013200","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"1579_CR32","unstructured":"Yang H, Miao X, Zhu H et\u00a0al (2014) Efficient certificateless ring signature scheme with identity tracing. Inf Secur Tech Rep 32\u201335"},{"key":"1579_CR33","doi-asserted-by":"crossref","unstructured":"Bouakkaz S, Semchedine F (2020) A certificateless ring signature scheme with batch verification for applications in Vanet. J Inf Secur Appl 55:102669","DOI":"10.1016\/j.jisa.2020.102669"},{"key":"1579_CR34","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1007\/s12083-020-01020-2","volume":"14","author":"W Wang","year":"2021","unstructured":"Wang W, Huang H, Zhang L et al (2021) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer Peer Netw Appl 14:2681\u20132693","journal-title":"Peer Peer Netw Appl"},{"key":"1579_CR35","doi-asserted-by":"crossref","unstructured":"Wang H, Wang L, Wen M et\u00a0al (2022) A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids. Wirel Pers Commun 1\u201323","DOI":"10.21203\/rs.3.rs-498186\/v1"},{"key":"1579_CR36","first-page":"1","volume":"2021","author":"F Tang","year":"2021","unstructured":"Tang F, Pang J, Cheng K et al (2021) Multiauthority traceable ring signature scheme for smart grid based on blockchain. Wirel Commun Mob Comput 2021:1\u20139","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"1579_CR37","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/JIOT.2020.3037252","volume":"8","author":"Y Cai","year":"2021","unstructured":"Cai Y, Zhang H, Fang Y (2021) A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks. IEEE Internet Things J 8(1):647\u2013656. https:\/\/doi.org\/10.1109\/JIOT.2020.3037252","journal-title":"IEEE Internet Things J"},{"key":"1579_CR38","doi-asserted-by":"publisher","unstructured":"Du H, Wen Q, Zhang S et\u00a0al (2023) An improved conditional privacy protection scheme based on ring signcryption for Vanets. IEEE Internet Things J 1\u20131. https:\/\/doi.org\/10.1109\/JIOT.2023.3279896","DOI":"10.1109\/JIOT.2023.3279896"},{"key":"1579_CR39","doi-asserted-by":"publisher","unstructured":"Guo R, Xu L, Li X et al (2022) An efficient certificateless ring signcryption scheme with conditional privacy-preserving in Vanets. J Syst Architect 129:102633. https:\/\/doi.org\/10.1016\/j.sysarc.2022.102633","DOI":"10.1016\/j.sysarc.2022.102633"},{"key":"1579_CR40","doi-asserted-by":"publisher","unstructured":"Zhang S, Guo Y, Wang B (2023) A privacy protection scheme for bidding users of peer-to-peer electricity call auction trading in microgrids. IEEE Syst J 1\u201312. https:\/\/doi.org\/10.1109\/JSYST.2023.3242012","DOI":"10.1109\/JSYST.2023.3242012"},{"key":"1579_CR41","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"1579_CR42","doi-asserted-by":"publisher","unstructured":"De\u00a0Caro A, Iovino V (2011) JPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC). pp 850\u2013855. https:\/\/doi.org\/10.1109\/ISCC.2011.5983948","DOI":"10.1109\/ISCC.2011.5983948"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01579-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01579-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01579-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T11:37:01Z","timestamp":1708169821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01579-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1579"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01579-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"12 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"None of the authors of this paper conducted any studies using humans or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}