{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:18:47Z","timestamp":1734067127878,"version":"3.30.2"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,11]]},"DOI":"10.1109\/icceic64099.2024.10775600","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:21:58Z","timestamp":1733955718000},"page":"157-162","source":"Crossref","is-referenced-by-count":0,"title":["A Certificate Less Group Signature Scheme for Power Internet of Things based on CoSi Protocol"],"prefix":"10.1109","author":[{"given":"Huale","family":"Zhang","sequence":"first","affiliation":[{"name":"State grid Anhui Electric power Co., LTD.,Information and communication branch,Hefei,China"}]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"State grid Anhui Electric power Co., LTD.,Information and communication branch,Hefei,China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"State grid Anhui Electric power Co., LTD.,Information and communication branch,Hefei,China"}]},{"given":"Xiaolong","family":"Chen","sequence":"additional","affiliation":[{"name":"State grid Anhui Hefei power supply company,Hefei,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7356-9_17"},{"key":"ref2","first-page":"452","article-title":"Certificateless public key cryptography","volume-title":"International conference on the theory and application of cryptology and information security","author":"Al-Riyami","year":"2003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.38"},{"issue":"1","key":"ref4","first-page":"21","article-title":"Multi-signature schemes secure against active insider attacks","volume":"82","author":"Ohta","year":"1999","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2020.3042648"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.10.010"},{"issue":"4","key":"ref7","doi-asserted-by":"crossref","first-page":"5636","DOI":"10.1109\/JSYST.2023.3269597","article-title":"An efficient certificateless signature scheme with provably security and its applications","volume":"17","author":"Ma","year":"2023","journal-title":"IEEE Systems Journal"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"40198","DOI":"10.1109\/ACCESS.2021.3063490","article-title":"A novel efficient certificateless signature scheme for the prevention of content poisoning attack in named data networking-based internet of things","volume":"9","author":"Hussain","year":"2021","journal-title":"IEEE access"},{"issue":"10","key":"ref9","doi-asserted-by":"crossref","first-page":"7059","DOI":"10.1109\/TII.2021.3084753","article-title":"Blockchain-based reliable and efficient certificateless signature for IIoT devices","volume":"18","author":"Wang","year":"2021","journal-title":"IEEE transactions on industrial informatics"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2023.3343437","article-title":"A secure certificateless signature scheme for cloud-assisted Industrial IoT","author":"Shim","year":"2024","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"ref11","doi-asserted-by":"crossref","first-page":"1884","DOI":"10.1109\/TII.2023.3282317","article-title":"Cryptanalysis and improvement of a blockchain-based certificateless signature for IIoT devices","volume":"20","author":"Yang","year":"2023","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"102074","DOI":"10.1016\/j.adhoc.2020.102074","article-title":"A new provably secure certificateless signature scheme for Internet of Things","volume":"100","author":"Du","year":"2020","journal-title":"Ad Hoc Networks"},{"issue":"8","key":"ref13","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1109\/LCOMM.2020.2988818","article-title":"Efficient pairing-free certificateless signature scheme for secure communication in resource-constrained devices","volume":"24","author":"Thumbur","year":"2020","journal-title":"IEEE Communications Letters"},{"issue":"5","key":"ref14","doi-asserted-by":"crossref","first-page":"4962","DOI":"10.1007\/s11227-022-04795-8","article-title":"PSCLS: provably secure certificateless signature scheme for IoT device on cloud","volume":"79","author":"Yadav","year":"2023","journal-title":"The Journal of Supercomputing"},{"key":"ref15","first-page":"124848","article-title":"Design principles of secure certificateless signature and aggregate signature schemes for IoT environments","volume-title":"IEEE Access","volume":"10","author":"Shim","year":"2022"},{"issue":"1","key":"ref16","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/s12083-023-01588-5","article-title":"A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system","volume":"17","author":"Dong","year":"2024","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2197\/ipsjjip.29.525","article-title":"A new schnorr multi-signatures to support both multiple messages signing and key aggregation","volume":"29","author":"Kojima","year":"2021","journal-title":"Journal of Information Processing"},{"issue":"5","key":"ref18","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1177\/15501329221080658","article-title":"A certificateless aggregate signature scheme for security and privacy protection in VANET","volume":"18","author":"Cahyadi","year":"2022","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref19","article-title":"Certificateless aggregate signature scheme with security proofs in the standard model suitable for Internet of Vehicles","author":"Deng","year":"2024","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"ref20","doi-asserted-by":"crossref","first-page":"10881","DOI":"10.1109\/JIOT.2023.3240426","article-title":"Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks","volume":"10","author":"Yang","year":"2023","journal-title":"IEEE Internet of Things Joumal"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3672919.3672935","article-title":"A certificateless aggregate signature scheme without bilinear pairing","volume-title":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","author":"Shen","year":"2024"},{"issue":"4","key":"ref22","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1109\/TGCN.2023.3265608","article-title":"A blockchain-based certificateless aggregate signature scheme for fog-enabled smart grid environment","volume":"7","author":"Tomar","year":"2023","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"08","key":"ref23","first-page":"440","article-title":"A blockchain certificateless encryption mechanism based on national secret algorithm [J]","volume-title":"Computer Science","volume":"51","author":"Xiang","year":"2024"}],"event":{"name":"2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","start":{"date-parts":[[2024,10,11]]},"location":"Guangzhou, China","end":{"date-parts":[[2024,10,13]]}},"container-title":["2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10774577\/10775297\/10775600.pdf?arnumber=10775600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:04:50Z","timestamp":1733987090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10775600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icceic64099.2024.10775600","relation":{},"subject":[],"published":{"date-parts":[[2024,10,11]]}}}