{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:43:12Z","timestamp":1768552992873,"version":"3.49.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Technology planning project of ShenZhen","award":["JCYJ20170818112550194"],"award-info":[{"award-number":["JCYJ20170818112550194"]}]},{"name":"Researchers Supporting Project of King Saud University","award":["RSP-2019\/12"],"award-info":[{"award-number":["RSP-2019\/12"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972294, 61932016, 61822202, 61872089, and 61972094"],"award-info":[{"award-number":["61972294, 61932016, 61822202, 61872089, and 61972094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,2,28]]},"abstract":"<jats:p>With the evolvement of the Internet of things (IoT), privacy and security have become the primary indicators for users to deploy IoT applications. In the gateway-based IoT architecture, gateways aggregate data collected by perception-layer devices and upload message packets to platforms, while platforms automatically push different categories of data to different applications. However, security in processes of data transmission via gateways, storage in platforms, access by applications is the major challenge for user privacy protection. To tackle this challenge, this article presents a secure IoT scheme based on a fine-grained multi-receive signcryption scheme to realize end-to-end secure transmission and data access control. To enhance the security of online application decryption keys, we design a distributed threshold decryption scheme based on secret-sharing. Moreover, from the provable security perspective, we demonstrate that the scheme can achieve the expected IND-CCA security and EUF-CMA security. After the performance analysis, evaluation results show that the computational performance is efficient and linearly subject to the number of messages and the number of receivers.<\/jats:p>","DOI":"10.1145\/3414475","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T18:32:48Z","timestamp":1609871568000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Distributed Decryption Scheme for IoT Gateway-based Applications"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-3255","authenticated-orcid":false,"given":"Cong","family":"Peng","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, Wuhan, China"}]},{"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, Wuhan, China"}]},{"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar University, Patiala, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0351-y"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.08.003"},{"key":"e_1_2_1_4_1","article-title":"Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data","volume":"10","author":"Chen Biwen","year":"2019","unstructured":"Biwen Chen , Libing Wu , Neeraj Kumar , Kim-Kwang Raymond Choo , and Debiao He . 2019 . Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data . IEEE Trans. Emerg. Top. Comput. DOI : 10 .1109\/TETC.2019.2921113 10.1109\/TETC.2019.2921113 Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, and Debiao He. 2019. Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data. IEEE Trans. Emerg. Top. Comput. DOI:10.1109\/TETC.2019.2921113","journal-title":"IEEE Trans. Emerg. Top. Comput. DOI"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301661"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_12"},{"key":"e_1_2_1_8_1","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson Darrel","unstructured":"Darrel Hankerson , Alfred J. Menezes , and Scott Vanstone . 2006. Guide to Elliptic Curve Cryptography . Springer Science 8 Business Media. Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone. 2006. Guide to Elliptic Curve Cryptography. Springer Science 8 Business Media."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.04.017"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9275-7"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0983-3"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897870"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TVT.2019.2946935","article-title":"Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs","volume":"69","author":"Jian Shen","year":"2019","unstructured":"Shen Jian , Dengzhi Liu , Xiaofeng Chen , Jin Li , Neeraj Kumar , and Pandi Vijayakumar . 2019 . Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs . IEEE Trans. Vehic. Technol. 69 , 1 (2019), 807 -- 817 . Shen Jian, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, and Pandi Vijayakumar. 2019. Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs. IEEE Trans. Vehic. Technol. 69, 1 (2019), 807--817.","journal-title":"IEEE Trans. Vehic. Technol."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2691-0"},{"key":"e_1_2_1_15_1","first-page":"189","article-title":"An efficient identity based multi-receiver signcryption scheme using ECC","volume":"2","author":"Khullar Shweta","year":"2013","unstructured":"Shweta Khullar , Vivek Richhariya , and Vineet Richhariya . 2013 . An efficient identity based multi-receiver signcryption scheme using ECC . Int. J. Advanc. Res. Technol. 2 , 4 (2013), 189 -- 193 . Shweta Khullar, Vivek Richhariya, and Vineet Richhariya. 2013. An efficient identity based multi-receiver signcryption scheme using ECC. Int. J. Advanc. Res. Technol. 2, 4 (2013), 189--193.","journal-title":"Int. J. Advanc. Res. Technol."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_11"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1650"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552--559","author":"Liang Kaitai","unstructured":"Kaitai Liang , Liming Fang , Willy Susilo , and Duncan S. Wong . 2013. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security . In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552--559 . Kaitai Liang, Liming Fang, Willy Susilo, and Duncan S. Wong. 2013. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552--559."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3397"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2809672"},{"key":"e_1_2_1_24_1","unstructured":"MIRACL Ltd. 2019. MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. Retrieved from https:\/\/github.com\/miracl\/MIRACL.  MIRACL Ltd. 2019. MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. Retrieved from https:\/\/github.com\/miracl\/MIRACL."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866845"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.298.18.2164"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2949708"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958089"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88733-1_4"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 3rd International Workshop on Security in Cloud Computing. 41--52","author":"Srinivasan Akshayaram","unstructured":"Akshayaram Srinivasan and C. Pandu Rangan . 2015. Certificateless proxy re-encryption without pairing: Revisited . In Proceedings of the 3rd International Workshop on Security in Cloud Computing. 41--52 . Akshayaram Srinivasan and C. Pandu Rangan. 2015. Certificateless proxy re-encryption without pairing: Revisited. In Proceedings of the 3rd International Workshop on Security in Cloud Computing. 41--52."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944632"},{"key":"e_1_2_1_35_1","volume-title":"The EU General Data Protection Regulation (GDPR). A Practical Guide","author":"Voigt Paul","unstructured":"Paul Voigt and Axel Von dem Bussche . 2017. The EU General Data Protection Regulation (GDPR). A Practical Guide , 1 st ed. Springer International Publishing , Cham . Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st ed. Springer International Publishing, Cham.","edition":"1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1319523"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.65"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414507"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406699"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2019.8669423"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3414475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:38Z","timestamp":1750199918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2,28]]}},"alternative-id":["10.1145\/3414475"],"URL":"https:\/\/doi.org\/10.1145\/3414475","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}