{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:23:19Z","timestamp":1772205799519,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/jiot.2017.2741580","type":"journal-article","created":{"date-parts":[[2017,8,18]],"date-time":"2017-08-18T18:25:37Z","timestamp":1503080737000},"page":"2904-2914","source":"Crossref","is-referenced-by-count":137,"title":["Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-7354","authenticated-orcid":false,"given":"Arijit","family":"Karati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2703-0213","authenticated-orcid":false,"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9513-9990","authenticated-orcid":false,"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7379-2641","authenticated-orcid":false,"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"165","article-title":"Cryptanalysis of an identity based signcryption scheme in the standard model","volume":"18","author":"ming","year":"2016","journal-title":"Int J Netw Security"},{"key":"ref38","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.06.030"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.06.043"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.11.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0320-6"},{"key":"ref37","first-page":"362","article-title":"Identity-based signcryption","volume":"3386","author":"malone-lee","year":"2002","journal-title":"Proceedings of Public Key Cryptography (PKC 2003)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref35","author":"lynn","year":"2007","journal-title":"PBC Library - Pairing-Based Cryptography"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2003.1216718"},{"key":"ref28","article-title":"Provably secure identity-based aggregate signcryption scheme in random oracles","author":"kar","year":"2013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0352-3"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-1-4757-6856-5_5","article-title":"The state of elliptic curve cryptography","author":"koblitz","year":"2000","journal-title":"Towards a Quarter-Century of Public Key Cryptography"},{"key":"ref2","article-title":"On language","author":"safire","year":"2009","journal-title":"New York Times Mag"},{"key":"ref1","year":"2017","journal-title":"Gartner says 8 4 billion connected"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.08.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E94.A.268"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.79"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/11833529_97","article-title":"ECGSC: Elliptic curve based generalized signcryption scheme","author":"han","year":"2006"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/11761679_27","article-title":"Practical identity-based encryption without random oracles","author":"gentry","year":"2006","journal-title":"Advances in Cryptology&#x2014;EUROCRYPT 2006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2009.12.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.776674"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.14"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.034"},{"key":"ref54","first-page":"165","article-title":"Digital signcryption or how to achieve cost (signature & encryption) << cost (signature)+ cost (encryption)","author":"zheng","year":"1997","journal-title":"Adv Cryptology"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.014"},{"key":"ref52","first-page":"240","article-title":"A revocable id-based signcryption scheme","volume":"3","author":"wu","year":"2012","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9078-6"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology ? CRYPTO 2001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.408"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","article-title":"Multipurpose identity-based signcryption","author":"boyen","year":"2003","journal-title":"Advances in Cryptology&#x2014;CRYPTO 2003"},{"key":"ref13","article-title":"Identity-based signcryption system","author":"boyen","year":"2012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2581147"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2016.2581147","article-title":"Hierarchical and shared access control","volume":"11","author":"castiglione","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref16","first-page":"484","article-title":"A practical identity-based signcryption scheme","volume":"15","author":"chen","year":"2013","journal-title":"Int J Netw Security"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","article-title":"Improved identity-based signcryption","author":"chen","year":"2005","journal-title":"Public Key Cryptography&#x2014;PKC 2005"},{"key":"ref18","first-page":"352","article-title":"Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity","author":"chow","year":"2003","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"key":"ref4","first-page":"97","article-title":"That &#x2018;Internet of Things&#x2019; thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref3","article-title":"A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment","author":"amin","year":"2016","journal-title":"Future Gener Comput Syst"},{"key":"ref6","author":"bar","year":"2013","journal-title":"Confidentiality and Integrity in Crowdsourcing Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-0211-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3034950.3035011"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804213"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_28"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2016.7846745"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3946"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0249-3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2013.01382"},{"key":"ref47","article-title":"Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes","author":"tao","year":"2016","journal-title":"Future Gener Comput Syst"},{"key":"ref42","article-title":"On the security of ID based signcryption schemes","author":"selvi","year":"2011"},{"key":"ref41","article-title":"On the protection of consumer genomic data in the Internet of living things","author":"pizzolante","year":"2017","journal-title":"Comput Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-33272-2_4","article-title":"ID based signcryption scheme in standard model","author":"selvi","year":"2012","journal-title":"Provable Security"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8430490\/08013031.pdf?arnumber=8013031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:01:05Z","timestamp":1643202065000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8013031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2017.2741580","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}