{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:05:43Z","timestamp":1778609143416,"version":"3.51.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:00:00Z","timestamp":1711065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:00:00Z","timestamp":1711065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61971014"],"award-info":[{"award-number":["61971014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC\u2019s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.<\/jats:p>","DOI":"10.1186\/s13677-024-00631-x","type":"journal-article","created":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T19:02:53Z","timestamp":1711134173000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A secure cross-domain authentication scheme based on threshold signature for MEC"],"prefix":"10.1186","volume":"13","author":[{"given":"Lei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Bei","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Waqas","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Haowen","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,22]]},"reference":[{"key":"631_CR1","doi-asserted-by":"publisher","unstructured":"Zhou W, Fan L, Zhou F, Li F, Lei X, Xu W, Nallanathan A (2023) Priorityaware resource scheduling for uav-mounted mobile edge computing networks. IEEE Trans Veh Technol 72(7):9682\u20139687 (2023). https:\/\/doi.org\/10.1109\/TVT.2023.3247431","DOI":"10.1109\/TVT.2023.3247431"},{"issue":"5","key":"631_CR2","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1109\/TPDS.2023.3247061","volume":"34","author":"R Luo","year":"2023","unstructured":"Luo R, Jin H, He Q, Wu S, Xia X (2023) Enabling balanced data deduplication in mobile edge computing. IEEE Trans Parallel Distrib Syst 34(5):1420\u20131431","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"21","key":"631_CR3","doi-asserted-by":"publisher","first-page":"21398","DOI":"10.1109\/JIOT.2022.3181136","volume":"9","author":"L Qi","year":"2022","unstructured":"Qi L, Liu Y, Zhang Y, Xu X, Bilal M, Song H (2022) Privacy-aware point-of-interest category recommendation in internet of things. IEEE Internet Things J 9(21):21398\u201321408. https:\/\/doi.org\/10.1109\/JIOT.2022.3181136","journal-title":"IEEE Internet Things J"},{"key":"631_CR4","doi-asserted-by":"publisher","unstructured":"Xie T (2023) Campus iot system and students' employment education innovation basedon mobile edge computing. Soft Comput 27(14):10263\u201310272. https:\/\/doi.org\/10.1007\/s00500-023-08288-5","DOI":"10.1007\/s00500-023-08288-5"},{"key":"631_CR5","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhou X, Kou H, Zhao Y, Xu X, Zhang X, Qi L (2023) Privacy-preserving point-of-interest recommendation based on simplified graph convolutional network for geological traveling. ACM Trans Intell Syst Technol. https:\/\/doi.org\/10.1145\/3620677","DOI":"10.1145\/3620677"},{"key":"631_CR6","doi-asserted-by":"publisher","unstructured":"Wang L, Deng X, Gui J, Chen X, Wan S (2023) Microservice-oriented service placement for mobile edge computing in sustainable internet of vehicles. IEEE Trans Intell Transp Syst 24(9):10012\u201310026. https:\/\/doi.org\/10.1109\/TITS.2023.3274307","DOI":"10.1109\/TITS.2023.3274307"},{"issue":"3","key":"631_CR7","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TSC.2020.3004627","volume":"15","author":"Z Ma","year":"2020","unstructured":"Ma Z, Ma J, Miao Y, Liu X, Choo KKR, Yang R, Wang X (2020) Lightweight privacy-preserving medical diagnosis in edge computing. IEEE Trans Serv Comput 15(3):1606\u20131618","journal-title":"IEEE Trans Serv Comput"},{"issue":"100","key":"631_CR8","first-page":"867","volume":"38","author":"QV Khanh","year":"2023","unstructured":"Khanh QV, Nguyen VH, Minh QN, Van AD, Le Anh N, Chehri A (2023) An efficient edge computing management mechanism for sustainable smart cities. Sustain Comput Inf Syst 38(100):867","journal-title":"Sustain Comput Inf Syst"},{"issue":"1","key":"631_CR9","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCC.2019.2950395","volume":"10","author":"K Guo","year":"2019","unstructured":"Guo K, Yang M, Zhang Y, Cao J (2019) Joint computation offloading and bandwidth assignment in cloud-assisted edge computing. IEEE Trans Cloud Comput 10(1):451\u2013460","journal-title":"IEEE Trans Cloud Comput"},{"issue":"2","key":"631_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3458931","volume":"22","author":"X Zheng","year":"2022","unstructured":"Zheng X, Li M, Shah SBH, Do DT, Chen Y, Mavromoustakis CX, Mastorakis G, Pallis E (2022) Enhancing security-problem-based deep learning in mobile edge computing. ACM Trans Internet Technol 22(2):1\u201315","journal-title":"ACM Trans Internet Technol"},{"key":"631_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.comcom.2022.01.005","volume":"186","author":"K Mahmood","year":"2022","unstructured":"Mahmood K, Ayub MF, Hassan SZ, Ghaffar Z, Lv Z, Chaudhry SA (2022) A seamless anonymous authentication protocol for mobile edge computing infrastructure. Comput Commun 186:12\u201321","journal-title":"Comput Commun"},{"key":"631_CR12","doi-asserted-by":"publisher","first-page":"103053","DOI":"10.1016\/j.cose.2022.103053","volume":"125","author":"M Saqib","year":"2023","unstructured":"Saqib M, Moon AH (2023) A systematic security assessment and review of internet of things in the context of authentication. Comput Secur 125:103053","journal-title":"Comput Secur"},{"key":"631_CR13","doi-asserted-by":"crossref","unstructured":"Al\u00a0Kabir MA, Elmedany W (2022) An overview of the present and future of user authentication. In: 2022 4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM), IEEE, p 10\u201317","DOI":"10.1109\/MENACOMM57252.2022.9998304"},{"issue":"7","key":"631_CR14","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.3390\/s22072561","volume":"22","author":"J Astorga","year":"2022","unstructured":"Astorga J, Barcelo M, Urbieta A, Jacob E (2022) Revisiting the feasibility of public key cryptography in light of iiot communications. Sensors 22(7):2561","journal-title":"Sensors"},{"issue":"6","key":"631_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"M Hellman","year":"1976","unstructured":"Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"631_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","volume":"476","author":"H Zhong","year":"2019","unstructured":"Zhong H, Han S, Cui J, Zhang J, Xu Y (2019) Privacy-preserving authentication scheme with full aggregation in vanet. Inf Sci 476:211\u2013221","journal-title":"Inf Sci"},{"issue":"2","key":"631_CR17","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","volume":"18","author":"J Zhang","year":"2019","unstructured":"Zhang J, Cui J, Zhong H, Chen Z, Liu L (2019) Pa-crt: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans Dependable Secure Comput 18(2):722\u2013735","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"631_CR18","doi-asserted-by":"publisher","first-page":"130247","DOI":"10.1109\/ACCESS.2021.3110804","volume":"9","author":"SU Jan","year":"2021","unstructured":"Jan SU, Khan HU (2021) Identity and aggregate signature-based authentication protocol for iod deployment military drone. IEEE Access 9:130247\u2013130263","journal-title":"IEEE Access"},{"key":"631_CR19","doi-asserted-by":"publisher","first-page":"95321","DOI":"10.1109\/ACCESS.2022.3204271","volume":"10","author":"SU Jan","year":"2022","unstructured":"Jan SU, Abbasi IA, Algarni F, Khan AS (2022) A verifiably secure ecc based authentication scheme for securing iod using fanet. IEEE Access 10:95321\u201395343","journal-title":"IEEE Access"},{"issue":"2","key":"631_CR20","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TITS.2020.3024000","volume":"23","author":"A Yang","year":"2020","unstructured":"Yang A, Weng J, Yang K, Huang C, Shen X (2020) Delegating authentication to edge: a decentralized authentication architecture for vehicular networks. IEEE Trans Intell Transp Syst 23(2):1284\u20131298","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"631_CR21","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TDSC.2016.2601610","volume":"15","author":"D Basin","year":"2016","unstructured":"Basin D, Cremers C, Kim THJ, Perrig A, Sasse R, Szalachowski P (2016) Design, analysis, and implementation of arpki: an attack-resilient public-key infrastructure. IEEE Trans Dependable Secure Comput 15(3):393\u2013408","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"631_CR22","doi-asserted-by":"publisher","first-page":"3275","DOI":"10.1007\/s13369-017-2447-9","volume":"42","author":"C Yuan","year":"2017","unstructured":"Yuan C, Zhang W, Wang X (2017) Eimakp: Heterogeneous cross-domain authenticated key agreement protocols in the eim system. Arab J Sci Eng 42:3275\u20133287","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"631_CR23","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/electronics9040634","volume":"9","author":"X Jia","year":"2020","unstructured":"Jia X, Hu N, Su S, Yin S, Zhao Y, Cheng X, Zhang C (2020) Irba: An identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4):634","journal-title":"Electronics"},{"key":"631_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6697295","volume":"2021","author":"Y Gan","year":"2021","unstructured":"Gan Y (2021) A fully adaptively secure threshold signature scheme based on dual-form signatures technology. Secur Commun Netw 2021:1\u201311","journal-title":"Secur Commun Netw"},{"key":"631_CR25","doi-asserted-by":"crossref","unstructured":"Gerbush M, Lewko A, O\u2019Neill A, Waters B (2012) Dual form signatures: an approach for proving security from static assumptions. In: Advances in Cryptology\u2013ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings 18. Springer, p 25\u201342","DOI":"10.1007\/978-3-642-34961-4_4"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00631-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00631-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00631-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T19:03:22Z","timestamp":1711134202000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00631-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,22]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["631"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00631-x","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,22]]},"assertion":[{"value":"19 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This declaration is not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"70"}}