{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:17:33Z","timestamp":1774721853897,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/tii.2018.2794991","type":"journal-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T19:41:22Z","timestamp":1516304482000},"page":"3701-3711","source":"Crossref","is-referenced-by-count":190,"title":["Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-7354","authenticated-orcid":false,"given":"Arijit","family":"Karati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2703-0213","authenticated-orcid":false,"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7379-2641","authenticated-orcid":false,"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"28","article-title":"Efficient signature scheme for secure electronic transaction","volume":"5","author":"jose","year":"2016","journal-title":"J ComputSci & Technol"},{"key":"ref38","first-page":"101","article-title":"Cryptanalysis of Zheng et\ufffdal.'s pairing-free secure IBE scheme","author":"karati","year":"0","journal-title":"Proc 2015 Int Conf Inf Technol"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.04.004"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2310"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1330"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2490163"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1049\/iet-ifs.2012.0176","article-title":"New certificateless short\n signature scheme","volume":"7","author":"he","year":"2013","journal-title":"IET Inf Security"},{"key":"ref35","first-page":"969","article-title":"Truly\n non-repudiation certificateless short signature scheme from bilinear pairings","volume":"27","author":"fan","year":"2011","journal-title":"J Inf Sci Eng"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.4028\/www.scientific.net\/AMM.380-384.2435","article-title":"Certificateless short signature scheme from\n bilinear pairings","volume":"380","author":"feng","year":"2013","journal-title":"Appl Mech Mater"},{"key":"ref28","article-title":"On the\n security of a certificateless short signature scheme","author":"tian","year":"2011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.02.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.01.016"},{"key":"ref2","article-title":"Gartner says 8.4 billion connected","year":"2017"},{"key":"ref1","first-page":"97","article-title":"That &#x2018;internet of things&#x2019; thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref20","article-title":"Key replacement attack on a certificateless signature scheme","author":"zhang","year":"2006"},{"key":"ref22","first-page":"293","article-title":"Certificateless public-key signature:\n security model and efficient construction","author":"zhang","year":"2006","journal-title":"International Conference on Applied Cryptography and Network Security"},{"key":"ref21","article-title":"An attack on a\n certificateless signature scheme","author":"cao","year":"2006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.08.024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.013"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-540-89641-8_5","article-title":"Efficient and short\n certificateless signature","author":"tso","year":"2008","journal-title":"Cryptology and Network Security"},{"key":"ref50","article-title":"PBC library&#x2013;The pairing-based cryptography library","author":"lynn","year":"2007"},{"key":"ref10","first-page":"237","article-title":"On emerging family of elliptic curves to secure internet of things: ECC comes of age","volume":"14","author":"liu","year":"2017","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.138"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-319-49806-5_9","article-title":"An efficient certificateless signature scheme in the standard model","author":"canard","year":"2016","journal-title":"International Conference on Information Systems Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2517205"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-4076-8"},{"key":"ref14","first-page":"313","article-title":"Secure certificateless encryption with short ciphertext","volume":"19","author":"sun","year":"2010","journal-title":"Chin J Electron"},{"key":"ref15","first-page":"110","article-title":"An efficient certificateless signature scheme","author":"gorantla","year":"2005","journal-title":"Computational Intelligence and Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11807964_33"},{"key":"ref17","first-page":"399","article-title":"The exact security of digital signatures-how to sign with RSA and Rabin","author":"bellare","year":"1996","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref18","first-page":"171","article-title":"An\n uninstantiable random-oracle-model scheme for a hybrid-encryption problem","author":"bellare","year":"2004","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref6","article-title":"An\n analysis of the cloud computing security problem","author":"almorsy","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificateless public key cryptography","author":"al-riyami","year":"2003","journal-title":"Advances in Cryptology-ASIACRYPT 2003"},{"key":"ref7","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Advances in Cryptology"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.4028\/www.scientific.net\/AMM.34-35.1024","article-title":"An improved elliptic curve digital signature algorithm","volume":"34","author":"fan","year":"2010","journal-title":"Appl Mech Mater"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682701"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-012-0296-9"},{"key":"ref48","first-page":"354","article-title":"Efficient algorithms for pairing-based\n cryptosystems","author":"barreto","year":"2002","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.08.006"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.3390\/s17051001","article-title":"A novel certificateless\n signature scheme for smart objects in the internet-of-things","volume":"17","author":"yeh","year":"2017","journal-title":"SENSORS"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0553-x"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1588"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0367-6"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8426041\/08263151.pdf?arnumber=8263151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:13:00Z","timestamp":1643206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8263151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":50,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tii.2018.2794991","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}