{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T10:00:38Z","timestamp":1774173638561,"version":"3.50.1"},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","award":["HLW2025MS30"],"award-info":[{"award-number":["HLW2025MS30"]}],"id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372317"],"award-info":[{"award-number":["62372317"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24B20149"],"award-info":[{"award-number":["U24B20149"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472150"],"award-info":[{"award-number":["62472150"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62436004"],"award-info":[{"award-number":["62436004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272287"],"award-info":[{"award-number":["62272287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112181","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:35:54Z","timestamp":1772728554000},"page":"112181","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["RCBPS: Revocable certificate-based proxy signature scheme in the standard model for secure cloudIoT communications"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9016-5074","authenticated-orcid":false,"given":"Guangjin","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-3579","authenticated-orcid":false,"given":"Yanwei","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8960-5957","authenticated-orcid":false,"given":"Xianxiang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-1209","authenticated-orcid":false,"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8551-8826","authenticated-orcid":false,"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112181_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.ic.2025.105284","article-title":"Identity based proxy blind signature scheme using NTRU lattices","volume":"304","author":"Singh","year":"2025","journal-title":"Inf. Comput."},{"issue":"8","key":"10.1016\/j.comnet.2026.112181_bib0002","doi-asserted-by":"crossref","DOI":"10.3390\/e25081157","article-title":"Post-quantum secure identity-based proxy blind signature scheme on a lattice","volume":"25","author":"Li","year":"2023","journal-title":"Entropy"},{"key":"10.1016\/j.comnet.2026.112181_bib0003","doi-asserted-by":"crossref","first-page":"89133","DOI":"10.1109\/ACCESS.2021.3089009","article-title":"Securing internet of drones with identity-based proxy signcryption","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112181_bib0004","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.ins.2020.01.006","article-title":"An efficient and provable certificate-based proxy signature scheme for IIoT environment","volume":"518","author":"Verma","year":"2020","journal-title":"Inf. Sci."},{"issue":"3","key":"10.1016\/j.comnet.2026.112181_bib0005","doi-asserted-by":"crossref","first-page":"4719","DOI":"10.1109\/JSYST.2021.3131589","article-title":"Secure and efficient certificate-based proxy signature schemes for industrial internet of things","volume":"16","author":"Qiao","year":"2022","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.comnet.2026.112181_bib0006","first-page":"1","article-title":"An improvised certificate-based proxy signature using hyperelliptic curve cryptography for secure UAV communications","author":"Khan","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"16","key":"10.1016\/j.comnet.2026.112181_bib0007","doi-asserted-by":"crossref","first-page":"15116","DOI":"10.1109\/JIOT.2022.3148038","article-title":"Certificateless proxy signcryption in the standard model for a UAV network","volume":"9","author":"Qu","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comnet.2026.112181_bib0008","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-019-2903-2","article-title":"Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks","volume":"64","author":"He","year":"2020","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.comnet.2026.112181_bib0009","article-title":"Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems","volume":"87","author":"Zhang","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.comnet.2026.112181_bib0010","doi-asserted-by":"crossref","first-page":"57180","DOI":"10.1109\/ACCESS.2022.3178368","article-title":"New lattice-based short proxy signature scheme with fewer system parameters in the standard model","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112181_bib0011","doi-asserted-by":"crossref","first-page":"131188","DOI":"10.1109\/ACCESS.2020.3009351","article-title":"Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model","volume":"8","author":"Waheed","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2026.112181_bib0012","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1049\/iet-ifs.2015.0285","article-title":"Directed proxy signature with fast revocation proven secure in the standard model","volume":"11","author":"Pang","year":"2017","journal-title":"IET Inf. Secur."},{"key":"10.1016\/j.comnet.2026.112181_bib0013","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"417","article-title":"Identity-based encryption with efficient revocation","author":"Boldyreva","year":"2008"},{"issue":"4","key":"10.1016\/j.comnet.2026.112181_bib0014","doi-asserted-by":"crossref","first-page":"3097","DOI":"10.1109\/JIOT.2021.3094323","article-title":"Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things","volume":"9","author":"Xiong","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112181_bib0015","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/TIFS.2024.3516542","article-title":"TSR-ABE: Traceable and server-aided revocable ciphertext-policy attribute-based encryption under static assumptions","volume":"20","author":"Meng","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112181_bib0016","article-title":"Certificate-based proxy signature scheme with revocation for industrial internet of things","volume":"95","author":"Zhang","year":"2026","journal-title":"Compu. Stand. Interfaces"},{"key":"10.1016\/j.comnet.2026.112181_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2024.103894","article-title":"Revocable identity-based designated verifier proxy re-signature with signature evolution","volume":"92","author":"Zhang","year":"2025","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"10.1016\/j.comnet.2026.112181_bib0018","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","article-title":"Short signatures without random oracles and the SDH assumption in bilinear groups","volume":"21","author":"Boneh","year":"2008","journal-title":"J. Cryptol."},{"issue":"18","key":"10.1016\/j.comnet.2026.112181_bib0019","doi-asserted-by":"crossref","first-page":"15953","DOI":"10.1109\/JIOT.2023.3266335","article-title":"Certificateless anonymous signcryption scheme with provable security in the standard model suitable for healthcare wireless sensor networks","volume":"10","author":"Deng","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112181_bib0020","series-title":"Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part II","first-page":"66","article-title":"Towards a classification of non-interactive computational assumptions in cyclic groups","volume":"10625","author":"Ghadafi","year":"2017"},{"issue":"1","key":"10.1016\/j.comnet.2026.112181_bib0021","first-page":"455","article-title":"A secure and efficient identity-based proxy signcryption in cloud data sharing","volume":"14","author":"Hundera","year":"2020","journal-title":"KSII Trans. Internet Inf. Syst."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001933?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001933?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:45:33Z","timestamp":1774172733000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":21,"alternative-id":["S1389128626001933"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112181","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"RCBPS: Revocable certificate-based proxy signature scheme in the standard model for secure cloudIoT communications","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112181","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112181"}}