{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:15:08Z","timestamp":1773436508326,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"PDA grant of the Central Institute of Technology Kokrajhar, India"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3325305","type":"journal-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T14:04:52Z","timestamp":1697551492000},"page":"117341-117350","source":"Crossref","is-referenced-by-count":1,"title":["NTRU and Secret Sharing Based Secure Group Communication for IoT Applications"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1224-7783","authenticated-orcid":false,"given":"Sanchita","family":"Saha","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"given":"Ashlesha","family":"Hota","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2436-7443","authenticated-orcid":false,"given":"Bikramjit","family":"Choudhury","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-7307","authenticated-orcid":false,"given":"Amitava","family":"Nag","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5869-1057","authenticated-orcid":false,"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3680851"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.439"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527491"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.061"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2015.7154707"},{"key":"ref10","first-page":"267","article-title":"NTRU: A ring-based public key cryptosystem","author":"hoffstein","year":"2006","journal-title":"Algorithmic Number Theory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v12.i1.pp218-224"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108941"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1825-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1693"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4102"},{"key":"ref24","article-title":"NTRU based group oriented signature","author":"ma","year":"2009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04370-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref25","article-title":"NTRU-KE: A lattice-based public key exchange protocol","author":"lei","year":"2013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920860"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001544"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700787"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0026"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04533-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3269297"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2023.100867"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3307617"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2946618"},{"key":"ref6","author":"stinson","year":"2018","journal-title":"Cryptography Theory and Practice"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10286831.pdf?arnumber=10286831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:54:45Z","timestamp":1773431685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10286831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3325305","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}