{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:18:37Z","timestamp":1774937917478,"version":"3.50.1"},"reference-count":24,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Program of NSFC","award":["U1405255"],"award-info":[{"award-number":["U1405255"]}]},{"name":"Key Program of NSFC","award":["2016TZC-G-6-3"],"award-info":[{"award-number":["2016TZC-G-6-3"]}]},{"name":"Key Program of NSFC","award":["SA-ZD161504"],"award-info":[{"award-number":["SA-ZD161504"]}]},{"name":"Shaanxi Science & Technology Coordination & Innovation Project","award":["U1405255"],"award-info":[{"award-number":["U1405255"]}]},{"name":"Shaanxi Science & Technology Coordination & Innovation Project","award":["2016TZC-G-6-3"],"award-info":[{"award-number":["2016TZC-G-6-3"]}]},{"name":"Shaanxi Science & Technology Coordination & Innovation Project","award":["SA-ZD161504"],"award-info":[{"award-number":["SA-ZD161504"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["U1405255"],"award-info":[{"award-number":["U1405255"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016TZC-G-6-3"],"award-info":[{"award-number":["2016TZC-G-6-3"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["SA-ZD161504"],"award-info":[{"award-number":["SA-ZD161504"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,4,4]]},"abstract":"<jats:p>Unmanned Aerial Vehicle (UAV) has enormous potential in many domains. According to the characteristics of UAV, it is important for UAV network to assure low latency and integrity and authentication of commands sent by command center or command stations to UAV. In this paper, we proposed a UAV network architecture based on mobile edge computing (MEC) which helps guarantee low latency in the UAV network. Afterwards, we proposed a designated verifier proxy blind signature (DVPBS) scheme for UAV network and proved that it is existentially unforgeable under an adaptive chosen message attack in the random oracle model. We compared the efficiency of our DVPBS scheme with other signature schemes by implementing them in jPBC and theoretically analyzing their signature length. The experiment results indicate that our DVPBS scheme is efficient. The signature length of our DVPBS is longer, but it is still short enough compared with the transmission capacity of UAV.<\/jats:p>","DOI":"10.1155\/2019\/8583130","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T20:27:55Z","timestamp":1554409675000},"page":"1-12","source":"Crossref","is-referenced-by-count":16,"title":["Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing"],"prefix":"10.1155","volume":"2019","author":[{"given":"Lei","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"},{"name":"School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1679-5800","authenticated-orcid":true,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6076-6273","authenticated-orcid":true,"given":"Ruo","family":"Mo","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Dawei","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]}],"member":"311","reference":[{"issue":"3-4","key":"1","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1007\/s10846-017-0767-3","volume":"92","year":"2018","journal-title":"Journal of Intelligent & Robotic Systems"},{"issue":"2","key":"2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.cja.2017.09.005","volume":"31","year":"2018","journal-title":"Chinese Journal of Aeronautics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2572460"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2835638"},{"issue":"1","key":"8","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1186\/s13638-018-1091-8","volume":"2018","year":"2018","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2818734"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/app8071028"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2018.170145"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"13","volume":"3","year":"2016","journal-title":"ETSI, DGS MEC"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700286"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/app8071160"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016NTP0003"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2017NRI0001"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700882"},{"key":"20","first-page":"199","year":"1983","journal-title":"Advances in Cryptology"},{"key":"22","first-page":"212","volume":"21","year":"2002","journal-title":"MM Research Preprints"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.582"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-011-0071-1"},{"issue":"11","key":"25","volume":"28","year":"2017","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5401890"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.02.004"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2013.03.004"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0434"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/8583130.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/8583130.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/8583130.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T20:28:02Z","timestamp":1554409682000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/8583130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":24,"alternative-id":["8583130","8583130"],"URL":"https:\/\/doi.org\/10.1155\/2019\/8583130","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,4]]}}}