{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:08Z","timestamp":1775745008585,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003230"],"award-info":[{"award-number":["61003230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370026"],"award-info":[{"award-number":["61370026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202445"],"award-info":[{"award-number":["61202445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["ZYGX2013J073"],"award-info":[{"award-number":["ZYGX2013J073"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100012551","name":"Applied Basic Research Program of Sichuan Province","doi-asserted-by":"crossref","award":["2014JY0041"],"award-info":[{"award-number":["2014JY0041"]}],"id":[{"id":"10.13039\/100012551","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/tifs.2015.2414399","type":"journal-article","created":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T16:55:49Z","timestamp":1426697749000},"page":"1442-1455","source":"Crossref","is-referenced-by-count":165,"title":["Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks"],"prefix":"10.1109","volume":"10","author":[{"family":"Hu Xiong","sequence":"first","affiliation":[]},{"family":"Zhiguang Qin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"354","article-title":"Efficient algorithms for pairing-based cryptosystems","volume":"2442","author":"barreto","year":"2002","journal-title":"Advances in Cryptology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref33","first-page":"216","article-title":"Revocable identity-based encryption revisited: Security model and construction","volume":"7778","author":"seo","year":"2013","journal-title":"Proc 16th Int Conf Pract Theory Public-Key Cryptogr (PKC)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref31","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Advances in Cryptology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt040"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2289271"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.208"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2327758"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363553"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0252-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","article-title":"An ID-based client authentication with key agreement protocol for mobile client&#x2013;server environment on ECC with provable security","volume":"13","author":"he","year":"2012","journal-title":"Inf Fusion"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.008"},{"key":"ref24","first-page":"452","article-title":"Certificateless public key cryptography","author":"al-riyami","year":"2003","journal-title":"Proc Advances in Cryptology (ASIACRYPT)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2012389"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363786"},{"key":"ref25","first-page":"293","article-title":"Certificateless public-key signature: Security model and efficient construction","volume":"3989","author":"zhang","year":"2006","journal-title":"Proc 4th Int Conf Appl Cryptogr Netw Security (ACNS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2206115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422975"},{"key":"ref40","first-page":"302","article-title":"Malicious KGC attacks in certificateless cryptography","author":"au","year":"2007","journal-title":"Proc 2nd ACM Symp Inf Comput Commun Security (ASIACCS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2012.2235180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s90806273"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2033055"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.93"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"ref19","author":"smith","year":"2002","journal-title":"Authentication From Passwords to Public Keys"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2254714"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098979"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCOM.2011.5741143","article-title":"GRS: The green, reliability, and security of emerging machine to machine communications","volume":"49","author":"lu","year":"2011","journal-title":"IEEE Commun Mag"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2007.910901"},{"key":"ref49","first-page":"235","article-title":"Key replacement attack against a generic construction of certificateless signature","author":"hu","year":"2006","journal-title":"Proc 11th Austral Conf Inf Security Privacy (ACISP)"},{"key":"ref9","year":"2014","journal-title":"The Health Information Trust Alliance (HITRUST)"},{"key":"ref46","first-page":"83","article-title":"General and efficient certificateless public key encryption constructions","volume":"4575","author":"cheng","year":"2007","journal-title":"Proc 1st Int Conf Pairing-Based Cryptography (Pairing)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/11599371_2","article-title":"On the security of certificateless signature schemes from Asiacrypt 2003","author":"huang","year":"2005","journal-title":"Proc 4th Int Conf Cryptol Netw Security (CANS)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-008-0055-0"},{"key":"ref42","year":"2014","journal-title":"Shamus Software Ltd Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL)"},{"key":"ref41","first-page":"41","article-title":"Revocation and tracing schemes for stateless receivers","volume":"2139","author":"naor","year":"2001","journal-title":"Advances in Cryptology"},{"key":"ref44","first-page":"310","article-title":"Efficient identity based signature schemes based on pairings","volume":"2595","author":"hess","year":"2002","journal-title":"Proc 6th Annu Int Workshop Sel Areas Cryptogr (SAC)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.060255"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7109224\/07063237.pdf?arnumber=7063237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:42Z","timestamp":1641988062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7063237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":49,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2414399","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7]]}}}