{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:35:59Z","timestamp":1775540159858,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001348","name":"Agency for Science, Technology and Research","doi-asserted-by":"publisher","award":["A19D6a0053"],"award-info":[{"award-number":["A19D6a0053"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872051 and 61402085"],"award-info":[{"award-number":["61872051 and 61402085"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0351"],"award-info":[{"award-number":["FA9550-14-1-0351"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3372195","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"719-731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems"],"prefix":"10.1145","author":[{"given":"Zheng","family":"Yang","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]},{"given":"Yangguang","family":"Tian","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Junyu","family":"Lai","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"29","article-title":"W32. stuxnet dossier. White paper, Symantec Corp","volume":"5","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere , Liam O Murchu , and Eric Chien . 2011 . W32. stuxnet dossier. White paper, Symantec Corp ., SecurityResponse , Vol. 5 , 6 (2011), 29 . Nicolas Falliere, Liam OMurchu, and Eric Chien. 2011. W32. stuxnet dossier. White paper, Symantec Corp., SecurityResponse, Vol. 5, 6 (2011), 29.","journal-title":"SecurityResponse"},{"key":"e_1_3_2_2_2_1","unstructured":"Eduard Kovacs. [n.d.]. Attackers Alter Water Treatment Systems in UtilityHack: Report. https:\/\/www.securityweek.com\/attackers-alter-water-treatment-systems-utility-hack-report.  Eduard Kovacs. [n.d.]. Attackers Alter Water Treatment Systems in UtilityHack: Report. https:\/\/www.securityweek.com\/attackers-alter-water-treatment-systems-utility-hack-report."},{"key":"e_1_3_2_2_3_1","volume-title":"NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems","author":"Ahmed Chuadhry Mujeeb","unstructured":"Chuadhry Mujeeb Ahmed , Jianying Zhou , Aditya Mathur , Rizwan Qadeer , Reza Rahaeimehr , Carlos Murguia , and Justin Ruths . 2018. NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems . In AsiaCCS. Springer , 483--497. Chuadhry Mujeeb Ahmed, Jianying Zhou, Aditya Mathur, Rizwan Qadeer, Reza Rahaeimehr, Carlos Murguia, and Justin Ruths. 2018. NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. In AsiaCCS. Springer, 483--497."},{"key":"e_1_3_2_2_4_1","volume-title":"Kasper Bonne Rasmussen, and Srdjan Capkun","author":"Tippenhauer Nils Ole","year":"2011","unstructured":"Nils Ole Tippenhauer , Christina P\u00f6pper , Kasper Bonne Rasmussen, and Srdjan Capkun . 2011 . On the requirements for successful GPS spoofing attacks. In CCS. ACM , 75--86. Nils Ole Tippenhauer,Christina P\u00f6pper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In CCS. ACM, 75--86."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_2_6_1","volume-title":"Phuong Ha Nguyen,and Reza Rahaeimehr","author":"van Dijk Marten","year":"2018","unstructured":"Marten van Dijk , ChengluJin, Hoda Maleki , Phuong Ha Nguyen,and Reza Rahaeimehr . 2018 . Weak-Unforgeable Tags for Secure Supply ChainManagement. In FC. Springer ,80--98. Marten van Dijk, ChengluJin, Hoda Maleki, Phuong Ha Nguyen,and Reza Rahaeimehr. 2018. Weak-Unforgeable Tags for Secure Supply ChainManagement. In FC. Springer,80--98."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09311-5"},{"key":"e_1_3_2_2_9_1","volume-title":"Efficient Identification and Signatures for Smart Cards","author":"Schnorr Claus-Peter","unstructured":"Claus-Peter Schnorr . 1989. Efficient Identification and Signatures for Smart Cards . In CRYPTO. Springer , 239--252. Claus-Peter Schnorr. 1989. Efficient Identification and Signatures for Smart Cards. In CRYPTO. Springer, 239--252."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02254791"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Adi Shamir and Yael Tauman. 2001. Improved Online\/Offline Signature Schemes. In CRYPTO. Springer 355--367.  Adi Shamir and Yael Tauman. 2001. Improved Online\/Offline Signature Schemes. In CRYPTO. Springer 355--367.","DOI":"10.1007\/3-540-44647-8_21"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2232653"},{"key":"#cr-split#-e_1_3_2_2_13_1.1","doi-asserted-by":"crossref","unstructured":"A. A. Yavuz and M. O. Ozmen. 2019. Ultra Lightweight Multiple-time Digital Signature for the Internet of Things Devices. IEEE Transactions on Services Computing (2019) 1--1. https:\/\/doi.org\/10.1109\/TSC.2019.2928303 10.1109\/TSC.2019.2928303","DOI":"10.1109\/TSC.2019.2928303"},{"key":"#cr-split#-e_1_3_2_2_13_1.2","doi-asserted-by":"crossref","unstructured":"A. A. Yavuz and M. O. Ozmen. 2019. Ultra Lightweight Multiple-time Digital Signature for the Internet of Things Devices. IEEE Transactions on Services Computing (2019) 1--1. https:\/\/doi.org\/10.1109\/TSC.2019.2928303","DOI":"10.1109\/TSC.2019.2928303"},{"key":"e_1_3_2_2_14_1","volume-title":"Chameleon Signatures","author":"Krawczyk Hugo","unstructured":"Hugo Krawczyk and Tal Rabin . 2000. Chameleon Signatures . In NDSS. The InternetSociety . Hugo Krawczyk and Tal Rabin. 2000. Chameleon Signatures. In NDSS. The InternetSociety."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_2_16_1","volume-title":"Wegman","author":"Carter Larry","year":"1977","unstructured":"Larry Carter and Mark N . Wegman . 1977 . Universal Classes of Hash Functions (ExtendedAbstract). In STOC. ACM , 106--112. Larry Carter and Mark N. Wegman. 1977. Universal Classes of Hash Functions (ExtendedAbstract). In STOC. ACM, 106--112."},{"key":"e_1_3_2_2_17_1","unstructured":"Anna Pagh Rasmus Pagh and S. Srinivasa Rao. 2005. An optimal Bloom filter replacement. In SODA. SIAM 823--829.  Anna Pagh Rasmus Pagh and S. Srinivasa Rao. 2005. An optimal Bloom filter replacement. In SODA. SIAM 823--829."},{"key":"e_1_3_2_2_18_1","volume-title":"Optimal Asymmetric Encryption","author":"Bellare Mihir","unstructured":"Mihir Bellare and Phillip Rogaway . 1994. Optimal Asymmetric Encryption . In EUROCRYPT. Springer , 92--111. Mihir Bellare and Phillip Rogaway. 1994. Optimal Asymmetric Encryption. In EUROCRYPT. Springer, 92--111."},{"key":"e_1_3_2_2_19_1","volume-title":"Short Signatures Without Random Oracles","author":"Boneh Dan","unstructured":"Dan Boneh and Xavier Boyen . 2004. Short Signatures Without Random Oracles . In EUROCRYPT. Springer ,56--73. Dan Boneh and Xavier Boyen. 2004. Short Signatures Without Random Oracles. In EUROCRYPT. Springer,56--73."},{"key":"e_1_3_2_2_20_1","first-page":"332","article-title":"Sequences of games: a tool for taming complexity insecurity proofs","volume":"2004","author":"Shoup Victor","year":"2004","unstructured":"Victor Shoup . 2004 . Sequences of games: a tool for taming complexity insecurity proofs . IACR Cryptology ePrint Archive , Vol. 2004 (2004), 332 . Victor Shoup. 2004. Sequences of games: a tool for taming complexity insecurity proofs. IACR Cryptology ePrint Archive, Vol. 2004 (2004), 332.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_21_1","volume-title":"March","author":"PUB FIPS.","year":"2012","unstructured":"PUB FIPS. 2012. 180--4. Secure hash standard (SHS) , March ( 2012 ). PUB FIPS. 2012. 180--4. Secure hash standard (SHS), March (2012)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0873"},{"key":"e_1_3_2_2_23_1","volume-title":"Int J Navigation and Observation","volume":"2012","author":"Jafarnia-Jahromi A.","year":"2012","unstructured":"A. Jafarnia-Jahromi , A. Broumandan , J. Nielsen , and G. Lachapelle . 2012. GPS vulnerability to spoofing threats and a review of Antispoofing techniques . Int J Navigation and Observation , Vol. 2012 ( 2012 ). A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle. 2012. GPS vulnerability to spoofing threats and a review of Antispoofing techniques. Int J Navigation and Observation, Vol. 2012 (2012)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41445-018-0018-3"},{"key":"e_1_3_2_2_25_1","volume-title":"SmartGridComm","author":"Dan Gyorgy","unstructured":"Gyorgy Dan and HenrikSandberg. 2010. Stealth attacks and protection schemes for state estimators in power systems . In SmartGridComm . IEEE , 214--219. Gyorgy Dan and HenrikSandberg. 2010. Stealth attacks and protection schemes for state estimators in power systems. In SmartGridComm .IEEE, 214--219."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_2_2_27_1","volume-title":"Professor Doug Tygar, and Bob Briscoe","author":"Perrig Adrian","year":"2005","unstructured":"Adrian Perrig , RanCanetti, Dawn Song , Professor Doug Tygar, and Bob Briscoe . 2005 . Timed Efficient Stream Loss-Tolerant Authentication(TESLA): Multicast Source Authentication Transform Introduction. RFC 4082. https:\/\/doi.org\/10.17487\/RFC4082 10.17487\/RFC4082 Adrian Perrig, RanCanetti, Dawn Song, Professor Doug Tygar, and Bob Briscoe. 2005. Timed Efficient Stream Loss-Tolerant Authentication(TESLA): Multicast Source Authentication Transform Introduction. RFC 4082. https:\/\/doi.org\/10.17487\/RFC4082"},{"key":"e_1_3_2_2_28_1","volume-title":"Dawn Xiaodong Song, and J. D.Tygar","author":"Perrig Adrian","year":"2001","unstructured":"Adrian Perrig , RanCanetti , Dawn Xiaodong Song, and J. D.Tygar . 2001 . Efficient and Secure Source Authentication for Multicast. In NDSS. TheInternet Society . Adrian Perrig, RanCanetti, Dawn Xiaodong Song, and J. D.Tygar. 2001. Efficient and Secure Source Authentication for Multicast. In NDSS. TheInternet Society."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Adrian Perrig. 2001. The BiBa one-time signature and broadcast authentication protocol. In CCS. ACM 28--37.  Adrian Perrig. 2001. The BiBa one-time signature and broadcast authentication protocol. In CCS. ACM 28--37.","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Shang-Ming Chang Shiuhpyng Shieh Warren W. Lin and Chih-Ming Hsieh. 2006. An efficient broadcast authentication scheme in wireless sensor networks. In AsiaCCS .ACM 311--320.  Shang-Ming Chang Shiuhpyng Shieh Warren W. Lin and Chih-Ming Hsieh. 2006. An efficient broadcast authentication scheme in wireless sensor networks. In AsiaCCS .ACM 311--320.","DOI":"10.1145\/1128817.1128864"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.07.007"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18114021"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.06.008"},{"key":"e_1_3_2_2_36_1","volume-title":"How to Prove Yourself: Practical Solutions to Identification and Signature Problems","author":"Fiat Amos","unstructured":"Amos Fiat and Adi Shamir . 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems . In CRYPTO. Springer ,186--194. Amos Fiat and Adi Shamir. 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. Springer,186--194."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-0009-7"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0109-y"},{"key":"e_1_3_2_2_39_1","first-page":"1143","article-title":"An Improved Online\/Offline Identity-Based Signature Scheme for WSNs","volume":"18","author":"Gao Ya","year":"2016","unstructured":"Ya Gao , Peng Zeng , Kim-Kwang Raymond Choo , and Fu Song . 2016 . An Improved Online\/Offline Identity-Based Signature Scheme for WSNs . I. J. Network Security , Vol. 18 , 6 (2016), 1143 -- 1151 . Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, and Fu Song. 2016. An Improved Online\/Offline Identity-Based Signature Scheme for WSNs. I. J. Network Security, Vol. 18, 6 (2016), 1143--1151.","journal-title":"I. J. Network Security"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3112-2"},{"key":"e_1_3_2_2_41_1","volume-title":"One-Time Signatures and Chameleon Hash Functions","author":"Mohassel Payman","unstructured":"Payman Mohassel . 2010. One-Time Signatures and Chameleon Hash Functions . In SAC. Springer ,302--319. Payman Mohassel. 2010. One-Time Signatures and Chameleon Hash Functions. In SAC. Springer,302--319."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.277"},{"key":"e_1_3_2_2_43_1","volume-title":"Nearly Optimal Verifiable Data Streaming","author":"Krupp Johannes","unstructured":"Johannes Krupp , Dominique Schr\u00f6der , Mark Simkin , Dario Fiore , Giuseppe Ateniese , and Stefan N\u00fcrnberger . 2016. Nearly Optimal Verifiable Data Streaming . In PKC. Springer ,417--445. Johannes Krupp, Dominique Schr\u00f6der, Mark Simkin, Dario Fiore, Giuseppe Ateniese, and Stefan N\u00fcrnberger. 2016. Nearly Optimal Verifiable Data Streaming. In PKC. Springer,417--445."},{"key":"e_1_3_2_2_44_1","volume-title":"Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based","author":"Derler David","unstructured":"David Derler , Kai Samelin , Daniel Slamanig , and Christoph Striecks . 2019. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based . In NDSS. The InternetSociety . David Derler, Kai Samelin, Daniel Slamanig, and Christoph Striecks. 2019. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In NDSS. The InternetSociety."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234511"},{"key":"e_1_3_2_2_46_1","volume-title":"EUROCRYPT (1)","author":"Agrawal Shweta","unstructured":"Shweta Agrawal . 2019. Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation . In EUROCRYPT (1) . Springer , 191--225. Shweta Agrawal. 2019. Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation. In EUROCRYPT (1). Springer, 191--225."},{"key":"e_1_3_2_2_47_1","volume-title":"Tight Proofs for Signature Schemes without Random Oracles","author":"Schage Sven","unstructured":"Sven Schage . 2011. Tight Proofs for Signature Schemes without Random Oracles . In EUROCRYPT. Springer , 189--206. Sven Schage. 2011. Tight Proofs for Signature Schemes without Random Oracles. In EUROCRYPT. Springer, 189--206."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372195","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3372195","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3372195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:52Z","timestamp":1750273492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":47,"alternative-id":["10.1145\/3320269.3372195","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3372195","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}