{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:07Z","timestamp":1740149047926,"version":"3.37.3"},"reference-count":33,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T00:00:00Z","timestamp":1644364800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"],"award-info":[{"award-number":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Shaanxi Province","award":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"],"award-info":[{"award-number":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"],"award-info":[{"award-number":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"]}]},{"DOI":"10.13039\/501100017607","name":"Shenzhen Fundamental Research Program","doi-asserted-by":"publisher","award":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"],"award-info":[{"award-number":["61872229","61802239","62062019","62074131","2020ZDLGY09-06","2021ZDLGY06-04","2021ZDLGY05-01","2019JQ-667","2020JQ-422","20210317191843003"]}],"id":[{"id":"10.13039\/501100017607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,2,9]]},"abstract":"<jats:p>Healthcare cyber-physical system significantly facilitates healthcare services and patient treatment effectiveness by analyzing patients\u2019 health information data conveniently. Nevertheless, it also develops the threats to the confidentiality of health information, patients\u2019 privacy, and decidability of medical disputes. And, with the advances of quantum computing technology, most existing anonymous authentication schemes are becoming a growing threat to traditional cryptosystems. To address these problems, for healthcare cyber-physical systems, we propose a new lattice-based self-enhancement authorized accessible privacy authentication scheme by using a strong designated verifier double-authentication-preventing signature technique, called SEAPA. The SEAPA achieves three security and privacy requirements including unforgeability, anonymity for patients\u2019 information, and self-enhancement for patients themselves. A detailed security proof shows our proposal achieves those required security goals. Finally, our construction is demonstrated by parameter analysis and performance evaluation to have reasonable efficiency.<\/jats:p>","DOI":"10.1155\/2022\/8995704","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T02:05:15Z","timestamp":1644458715000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5665-026X","authenticated-orcid":true,"given":"Jinhui","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyber Security, Northwestern Polytechnical University, Xi\u2019an 710072, China"},{"name":"Research & Development Institute of Northwestern Polytechnical University, Shenzhen 518057, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0667-077X","authenticated-orcid":true,"given":"Yong","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710072, China"}]},{"given":"Houzhen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}]},{"given":"Huanguo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2460747"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.018"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2020.2969868"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6584-7_25"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2020.9105926"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12119"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5555\/1754495.1754513"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.028"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1504\/ijhpcn.2015.070013"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.033"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3390\/sym10110580"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2878406"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1149-2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2314119"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2013.6590046"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24691-6_4"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056097"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73549-6_116"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0146-1"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1016.2012.01579"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201707.19(4).10"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2017.2663765"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2889242"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9678095"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/11689522_20"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2903-2"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-021-03162-5"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2012.44"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.01.015"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2605087"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/8995704.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/8995704.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/8995704.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T02:05:24Z","timestamp":1644458724000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/8995704\/"}},"subtitle":[],"editor":[{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,2,9]]},"references-count":33,"alternative-id":["8995704","8995704"],"URL":"https:\/\/doi.org\/10.1155\/2022\/8995704","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2022,2,9]]}}}