{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:10Z","timestamp":1758987610442,"version":"3.44.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Major project of Basic Science (Natural science) research in colleges and universities of Jiangsu Province","award":["No.23KJA520003"],"award-info":[{"award-number":["No.23KJA520003"]}]},{"name":"the Postgraduate Research and Practice Innovation Program of Jiangsu Province","award":["no. SJCX23_1860"],"award-info":[{"award-number":["no. SJCX23_1860"]}]},{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61932011"],"award-info":[{"award-number":["No. 61932011"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Plan of China","award":["No. 2020YFB1005600"],"award-info":[{"award-number":["No. 2020YFB1005600"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01995-w","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:13:54Z","timestamp":1747739634000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneous signcryption scheme from CLC to IBC for IIoT"],"prefix":"10.1007","volume":"18","author":[{"given":"Chunhua","family":"Jin","sequence":"first","affiliation":[]},{"given":"Wenyu","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chenhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guanhua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,20]]},"reference":[{"issue":"4s","key":"1995_CR1","first-page":"202","volume":"12","author":"TMG Sami","year":"2024","unstructured":"Sami TMG, Zeebaree SR, Ahmed SH (2024) Designing a new hashing algorithm for enhancing iot devices security and energy management. Int J Intell Syst Appl Eng 12(4s):202\u2013215","journal-title":"Int J Intell Syst Appl Eng"},{"issue":"5","key":"1995_CR2","doi-asserted-by":"publisher","first-page":"4493","DOI":"10.1109\/TNSE.2024.3428916","volume":"11","author":"H Ghaemi","year":"2024","unstructured":"Ghaemi H, Abbasinezhad-Mood D (2024) Novel blockchain-integrated quantum-resilient self-certified authentication protocol for cross-industry communications. IEEE Trans Netw Sci Eng 11(5):4493\u20134502","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1995_CR3","doi-asserted-by":"crossref","unstructured":"Alshamaila Y, Papagiannidis S, Alsawalqah H, Aljarah I (2023) Effective use of smart cities in crisis cases: A systematic review of the literature. Int J Disast Risk Reduct, 103521","DOI":"10.1016\/j.ijdrr.2023.103521"},{"issue":"8","key":"1995_CR4","doi-asserted-by":"publisher","first-page":"3880","DOI":"10.3390\/s23083880","volume":"23","author":"D Oladimeji","year":"2023","unstructured":"Oladimeji D, Gupta K, Kose NA, Gundogan K, Ge L, Liang F (2023) Smart transportation: an overview of technologies and applications. Sensors 23(8):3880","journal-title":"Sensors"},{"key":"1995_CR5","unstructured":"Iqbal W, Abbas H, Deng P, Wan J, Rauf B, Abbas Y, Rashid I (2023) Alam: Anonymous lightweight authentication mechanism for sdn enabled smart homes. J Netw Comput Appl, 103672"},{"issue":"8","key":"1995_CR6","doi-asserted-by":"publisher","first-page":"368","DOI":"10.3390\/jrfm16080368","volume":"16","author":"M Richert","year":"2023","unstructured":"Richert M, Dudek M (2023) Selected problems of the automotive industry\u2014material and economic risk. J Risk Financial Manage 16(8):368","journal-title":"J Risk Financial Manage"},{"key":"1995_CR7","doi-asserted-by":"crossref","unstructured":"Goel A, Neduncheliyan S (2023) An intelligent blockchain strategy for decentralised healthcare framework. Peer-to-Peer Netw Appl, 1\u201312","DOI":"10.1007\/s12083-022-01429-x"},{"issue":"1","key":"1995_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s12083-022-01386-5","volume":"16","author":"X Liu","year":"2023","unstructured":"Liu X, Wang M, Wang T, Zhang R (2023) A blockchain assisted multi-gateway authentication scheme for iiot based on group. Peer-to-Peer Netw Appl 16(1):245\u2013259","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"1995_CR9","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TII.2022.3182984","volume":"19","author":"G Rathee","year":"2022","unstructured":"Rathee G, Kerrache CA, Lahby M (2022) Trustblksys: A trusted and blockchained cybersecure system for iiot. IEEE Trans Indust Inf 19(2):1592\u20131599","journal-title":"IEEE Trans Indust Inf"},{"key":"1995_CR10","doi-asserted-by":"crossref","unstructured":"Kumar R, Agrawal N (2023) Analysis of multi-dimensional industrial iot (iiot) data in edge-fog-cloud based architectural frameworks: A survey on current state and research challenges. J Indust Inf Integ, 100504","DOI":"10.1016\/j.jii.2023.100504"},{"issue":"15","key":"1995_CR11","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.3390\/s22155836","volume":"22","author":"AA Mirani","year":"2022","unstructured":"Mirani AA, Velasco-Hernandez G, Awasthi A, Walsh J (2022) Key challenges and emerging technologies in industrial iot architectures: A review. Sens 22(15):5836","journal-title":"Sens"},{"key":"1995_CR12","doi-asserted-by":"crossref","unstructured":"Peter O, Pradhan A, Mbohwa C (2023) Industrial internet of things (iiot): opportunities, challenges, and requirements in manufacturing businesses in emerging economies. Procedia Comput Sci 217:856\u2013865","DOI":"10.1016\/j.procs.2022.12.282"},{"key":"1995_CR13","doi-asserted-by":"crossref","unstructured":"Kumar R, Agrawal N (2023) Analysis of multi-dimensional industrial iot (iiot) data in edge-fog-cloud based architectural frameworks: A survey on current state and research challenges. J Indust Inf Integ, 100504","DOI":"10.1016\/j.jii.2023.100504"},{"issue":"3","key":"1995_CR14","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/TII.2019.2927512","volume":"16","author":"D Abbasinezhad-Mood","year":"2020","unstructured":"Abbasinezhad-Mood D, Ostad-Sharif A, Nikooghadam M, Mazinani SM (2020) A secure and efficient key establishment scheme for communications of smart meters and service providers in smart grid. IEEE Trans Indust Inf 16(3):1495\u20131502","journal-title":"IEEE Trans Indust Inf"},{"issue":"10","key":"1995_CR15","doi-asserted-by":"publisher","first-page":"13407","DOI":"10.1109\/TITS.2024.3410114","volume":"25","author":"D Abbasinezhad-Mood","year":"2024","unstructured":"Abbasinezhad-Mood D, Ghaemi H (2024) Dual-signature blockchain-based key sharing protocol for secure v2v communications in multi-domain iov environments. IEEE Trans Intell Transport Syst 25(10):13407\u201313416","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"1995_CR16","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG, et al (2003) Certificateless public key cryptography. In: Asiacrypt, vol 2894, pp 452\u2013473. Springer","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"1995_CR17","doi-asserted-by":"crossref","unstructured":"Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Applied cryptography and network security: 4th international conference, ACNS 2006, Singapore, 6-9 June, 2006. Proceedings 4, pp 293\u2013308. Springer","DOI":"10.1007\/11767480_20"},{"key":"1995_CR18","doi-asserted-by":"crossref","unstructured":"Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) $$\\ll $$ cost (signature)+ cost (encryption). In: Advances in cryptology\u2014CRYPTO\u201997: 17th annual international cryptology conference Santa Barbara, California, USA 17\u201321 August, 1997 Proceedings 17, pp 165\u2013179. Springer","DOI":"10.1007\/BFb0052234"},{"key":"1995_CR19","unstructured":"Malone-Lee J (2002) Identity-based signcryption. Cryptology ePrint Archive"},{"key":"1995_CR20","doi-asserted-by":"crossref","unstructured":"Barbosa M, Farshim P (2008) Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Comput Commun Secur, pp 369\u2013372","DOI":"10.1145\/1368310.1368364"},{"key":"1995_CR21","doi-asserted-by":"crossref","unstructured":"Wu C, Chen Z (2008) A new efficient certificateless signcryption scheme. In: 2008 International symposium on information science and engineering, IEEE vol 1, pp 661\u2013664","DOI":"10.1109\/ISISE.2008.206"},{"key":"1995_CR22","doi-asserted-by":"crossref","unstructured":"Long W, Deng L, Zeng J, Gao Y, Lu T (2024) An efficient certificateless anonymous signcryption scheme for wban. Sens (Basel, Switzerland) 24(15)","DOI":"10.3390\/s24154899"},{"issue":"21","key":"1995_CR23","doi-asserted-by":"publisher","first-page":"16142","DOI":"10.1109\/JIOT.2020.3008955","volume":"8","author":"H Xiong","year":"2020","unstructured":"Xiong H, Zhao Y, Hou Y, Huang X, Jin C, Wang L, Kumari S (2020) Heterogeneous signcryption with equality test for iiot environment. IEEE Internet of Things J 8(21):16142\u201316152","journal-title":"IEEE Internet of Things J"},{"key":"1995_CR24","doi-asserted-by":"crossref","unstructured":"Xu G, Dong J, Ma C, Liu J, Cliff UGO (2022) A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2022.3151359"},{"key":"1995_CR25","doi-asserted-by":"crossref","unstructured":"Elkhalil A, Elhabob R, Eltayieb N, et al (2021) An efficient signcryption of heterogeneous systems for internet of vehicles. J Syst Architec 113:101885","DOI":"10.1016\/j.sysarc.2020.101885"},{"issue":"6","key":"1995_CR26","doi-asserted-by":"publisher","first-page":"5974","DOI":"10.1109\/TVT.2021.3078806","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali I, Chen Y, Ullah N, Afzal M, Wen H (2021) Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Trans Veh Technol 70(6):5974\u20135989","journal-title":"IEEE Trans Veh Technol"},{"key":"1995_CR27","doi-asserted-by":"crossref","unstructured":"Ullah I, Zahid H, Algarni F, Khan MA (2022) An access control scheme using heterogeneous signcryption for iot environments. Comput Mater Continua 70(3):4307\u20134321","DOI":"10.32604\/cmc.2022.017380"},{"issue":"19","key":"1995_CR28","doi-asserted-by":"publisher","first-page":"19086","DOI":"10.1109\/JIOT.2022.3163607","volume":"9","author":"S Niu","year":"2022","unstructured":"Niu S, Shao H, Hu Y, Zhou S, Wang C (2022) Privacy-preserving mutual heterogeneous signcryption schemes based on 5g network slicing. IEEE Internet of Things J 9(19):19086\u201319100","journal-title":"IEEE Internet of Things J"},{"key":"1995_CR29","doi-asserted-by":"crossref","unstructured":"Jin C, Zhu H, Qin W, Chen Z, Jin Y, Shan J (2022) Heterogeneous online\/offline signcryption for secure communication in internet of things. J Syst Architec 127:102522","DOI":"10.1016\/j.sysarc.2022.102522"},{"key":"1995_CR30","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.future.2016.12.036","volume":"76","author":"F Li","year":"2017","unstructured":"Li F, Hong J, Omala AA (2017) Efficient certificateless access control for industrial internet of things. Future Gener Comput Syst 76:285\u2013292","journal-title":"Future Gener Comput Syst"},{"issue":"10","key":"1995_CR31","doi-asserted-by":"publisher","first-page":"7996","DOI":"10.1109\/TIE.2018.2807383","volume":"65","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood D, Nikooghadam M (2018) An anonymous ecc-based self-certified key distribution scheme for the smart grid. IEEE Trans Indust Electron 65(10):7996\u20138004","journal-title":"IEEE Trans Indust Electron"},{"key":"1995_CR32","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X (2004) Short signatures without random oracles. In: International conference on the theory and applications of cryptographic techniques, Springer pp 56\u201373","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"1995_CR33","doi-asserted-by":"crossref","unstructured":"Boyen X (2003) Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In: Advances in cryptology-CRYPTO 2003: 23rd annual international cryptology conference, Santa Barbara, California, USA, 17-21 August, 2003. Proceedings 23, Springer pp 383\u2013399","DOI":"10.1007\/978-3-540-45146-4_23"},{"key":"1995_CR34","doi-asserted-by":"crossref","unstructured":"Choon JC, Hee\u00a0Cheon J (2002) An identity-based signature from gap diffie-hellman groups. In: Public key cryptography\u2014PKC 2003: 6th international workshop on practice and theory in public key cryptography Miami, FL, USA, 6\u20138 January, 2003 Proceedings 6, Springer pp 18\u201330","DOI":"10.1007\/3-540-36288-6_2"},{"key":"1995_CR35","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361\u2013396","journal-title":"J Cryptol"},{"issue":"11","key":"1995_CR36","doi-asserted-by":"publisher","first-page":"8967","DOI":"10.1109\/JIOT.2021.3119513","volume":"9","author":"J Chen","year":"2021","unstructured":"Chen J, Wang L, Wen M, Zhang K, Chen K (2021) Efficient certificateless online\/offline signcryption scheme for edge iot devices. IEEE Internet of Things J 9(11):8967\u20138979","journal-title":"IEEE Internet of Things J"},{"issue":"1","key":"1995_CR37","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.adhoc.2012.04.015","volume":"11","author":"K-A Shim","year":"2013","unstructured":"Shim K-A, Lee Y-R, Park C-M (2013) Eibas: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw 11(1):182\u2013189","journal-title":"Ad Hoc Netw"},{"key":"1995_CR38","doi-asserted-by":"crossref","unstructured":"Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Cryptographic hardware and embedded systems-CHES 2004: 6th international workshop Cambridge, MA, USA, 11-13 August, 2004. Proceedings 6, Springer pp 119\u2013132","DOI":"10.1007\/978-3-540-28632-5_9"},{"issue":"4","key":"1995_CR39","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.comcom.2007.10.017","volume":"31","author":"X Cao","year":"2008","unstructured":"Cao X, Kou W, Dang L, Zhao B (2008) Imbas: Identity-based multi-user broadcast authentication in wireless sensor networks. Comput Commun 31(4):659\u2013667","journal-title":"Comput Commun"},{"issue":"4","key":"1995_CR40","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1002\/sec.777","volume":"7","author":"C Ma","year":"2014","unstructured":"Ma C, Xue K, Hong P (2014) Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur Commun Netw 7(4):759\u2013773","journal-title":"Secur Commun Netw"},{"key":"1995_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2014.01.011","volume":"19","author":"K-A Shim","year":"2014","unstructured":"Shim K-A (2014) S2drp: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Netw 19:1\u20138","journal-title":"Ad Hoc Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01995-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01995-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01995-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:28Z","timestamp":1758986488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01995-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,20]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1995"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01995-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,20]]},"assertion":[{"value":"11 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All authors have read and understood the publishing policy, and agreed to submit the manuscript to the journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"181"}}