{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:53:02Z","timestamp":1774806782840,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562012"],"award-info":[{"award-number":["61562012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010828","name":"Department of Education of Guizhou Province","doi-asserted-by":"publisher","award":["KY[2016]026"],"award-info":[{"award-number":["KY[2016]026"]}],"id":[{"id":"10.13039\/501100010828","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guizhou Provincial Science and Technology Foundation","award":["[2019]1434"],"award-info":[{"award-number":["[2019]1434"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/jsyst.2019.2935998","type":"journal-article","created":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T19:47:26Z","timestamp":1567021646000},"page":"3999-4006","source":"Crossref","is-referenced-by-count":8,"title":["Anonymous Aggregate Encryption Scheme for Industrial Internet of Things"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-1062","authenticated-orcid":false,"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0252"},{"key":"ref38","first-page":"114","article-title":"Efficient identity-based encryption without random oracles","volume":"3494","author":"waters","year":"0","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s10207-013-0215-8","article-title":"Lattice-based certificateless public-key encryption in the standard model","volume":"13","author":"reza","year":"2014","journal-title":"Int J Inf Secur"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E92.A.329"},{"key":"ref30","first-page":"531","article-title":"Identity based broadcast encryption with group of prime order","volume":"13","author":"ming","year":"2016","journal-title":"Int Arab J Inf Technol"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.68"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-4076-8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76969-9_13"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1165"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.052"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2667679"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref2","first-page":"380","article-title":"Efficient multi-receiver identity-based encryption and its application to broadcast encryption","volume":"3386","author":"baek","year":"0","journal-title":"Proc Int Workshop Public Key Cryptogr"},{"key":"ref1","first-page":"452","article-title":"Certificateless public cryptography","volume":"2894","author":"al-riyami","year":"0","journal-title":"Proc Adv Cryptol -ASIACRYPT"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E96.B.891"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_5"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TIFS.2014.2388156","article-title":"Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext","volume":"10","author":"kim","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv128"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.067"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.008"},{"key":"ref50","first-page":"1856","article-title":"Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation","volume":"7","author":"zhang","year":"2015","journal-title":"Symmetry"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2693"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794442"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2017.09.012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9965-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/sec.861"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1486437"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1053-x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2231-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75651-4_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2451193"},{"key":"ref17","first-page":"463","article-title":"Certificateless public key encryption secure against malicious KGC attacks in the standard model","volume":"14","author":"hwang","year":"2008","journal-title":"J Universal Comput Sci"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.03.003"},{"key":"ref19","first-page":"27","article-title":"An efficient anonymous identity-based broadcast encryption for large-scale wireless sensor networks","volume":"14","author":"kim","year":"2012","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref4","first-page":"394","article-title":"Multi-receiver identity-based key encapsulation with shortened ciphertext","volume":"4329","author":"chatterjee","year":"0","journal-title":"Intl Conf in Cryptology in India"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9078-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr086"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-013-3090-6"},{"key":"ref8","first-page":"223","article-title":"An improved certificateless encryption scheme for telecare medicine information systems","volume":"18","author":"deng","year":"2017","journal-title":"J Internet Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_20"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221893"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.23"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(09)70101-4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.045"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2011.02.011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.007"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600399CM"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0257"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0143975"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9185112\/08818639.pdf?arnumber=8818639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:02:52Z","timestamp":1651078972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8818639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":54,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2019.2935998","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}