{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T22:55:22Z","timestamp":1753052122568},"reference-count":32,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1587\/transinf.2022ngp0003","type":"journal-article","created":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T22:21:23Z","timestamp":1667254883000},"page":"1857-1871","source":"Crossref","is-referenced-by-count":1,"title":["Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Gyeongjin","family":"RA","sequence":"first","affiliation":[{"name":"Dept. of Software Convergence, Soonchunhyang University"}]},{"given":"Su-hyun","family":"KIM","sequence":"additional","affiliation":[{"name":"National IT Industry Promotion Agency"}]},{"given":"Imyeong","family":"LEE","sequence":"additional","affiliation":[{"name":"Dept. of Software Convergence, Soonchunhyang University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] X. Liu, Y. Zhu, Y. Ge, D. Wu, and B. Zou, \u201cA secure medical information management system for wireless body area networks,\u201d KSII Transactions on Internet and Information Systems (TIIS), vol.10, no.1, pp.221-237, 2016. 10.3837\/tiis.2016.01.013","DOI":"10.3837\/tiis.2016.01.013"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] X. Li, J. Niu, J. Gao, and Y. Han, \u201cSecure electronic ticketing system based on consortium Blockchain,\u201d KSII Transactions on Internet and Information Systems (TIIS), vol.13, no.10, pp.5219-5243, 2019. 10.3837\/tiis.2019.10.022","DOI":"10.3837\/tiis.2019.10.022"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N. Emmadi and H. Narumanchi, \u201cReinforcing Immutability of Permissioned Blockchains with Keyless Signatures&apos; Infrastructure,\u201d Proceedings of the 18th International Conference on Distributed Computing and Networking ACM, p.46, 2017. 10.1145\/3007748.3018280","DOI":"10.1145\/3007748.3018280"},{"key":"4","unstructured":"[4] D. Hankerson, A.J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, Springer Science &amp; Business Media, 2006."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] J.W. Jang, S. Kwon, S. Kim, J. Seo, J. Oh, and K.-H. Lee, \u201cCybersecurity framework for IIoT-based power system connected to microgrid,\u201d KSII Transactions on Internet and Information Systems (TIIS), vol.14, no.5, pp.2221-2235, 2020. 10.3837\/tiis.2020.05.020","DOI":"10.3837\/tiis.2020.05.020"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] D. Chen, G. Chang, and J. Jia, \u201cAC4E: An access control model for emergencies of mission-critical cyber-physical systems,\u201d KSII Transactions on Internet and Information Systems (TIIS), vol.6, no.9, pp.2052-2072, 2012. 10.3837\/tiis.2012.09.004","DOI":"10.3837\/tiis.2012.09.004"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] BW. Jin, J.O. Park, and M.S. Jeon, \u201cA study on authentication management and communication method using AKI based verification system in electronic helath records environment,\u201d Journal of IIBC, vol.16, no.6, pp.25-31, 2016.","DOI":"10.7236\/JIIBC.2016.16.6.25"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] R.C. Merkle, \u201cA digital signature based on a conventional encryption function,\u201d In Conference on the theory and application of cryptographic techniques, pp.369-378, Springer, 1987. 10.1007\/3-540-48184-2_32","DOI":"10.1007\/3-540-48184-2_32"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] J. Buchmann, E. Dahmen, S. Ereth, A. H\u00fclsing, and M. R\u00fcckert, \u201cOn the security of the Winternitz one-time signature scheme,\u201d In International Conference on Cryptology in Africa, pp.363-378, Springer, 2011. 10.1007\/978-3-642-21969-6_23","DOI":"10.1007\/978-3-642-21969-6_23"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] A. H\u00fclsing, \u201cW-OTS+shorter signatures for hash-based signature schemes,\u201d In International Conference on Cryptology in Africa, pp.173-188, Springer, 2013. 10.1007\/978-3-642-38553-7_10","DOI":"10.1007\/978-3-642-38553-7_10"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[12] NY.J. Buchmann, E. Dahmen, and A. H\u00fclsing, \u201cXMSS-a practical forward secure signature scheme based on minimal security assumptions,\u201d In International Workshop on Post-Quantum Cryptography, pp.117-129, Springer, 2011. 10.1007\/978-3-642-25405-5_8","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[13] D. Basin, C. Cremers, T.H.-J. Kim, A. Perrig, R. Sasse, and P.Szalachowski, \u201cARPKI: Attack resilient public-key infrastructure,\u201d In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.382-393, ACM, 2014. 10.1145\/2660267.2660298","DOI":"10.1145\/2660267.2660298"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[14] R. Longo, F. Pintore, G. Rinaldo, and M. Sala, \u201cOn the security of the Blockchain Bix Protocol and Certificates,\u201d In 2017 9th International Conference on Cyber Conflict (CyCon), pp.1-16, IEEE, 2017. 10.23919\/cycon.2017.8240338","DOI":"10.23919\/CYCON.2017.8240338"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[15] K. Gu, N. Wu, Y. Liu, F. Yu, and B. Yin, \u201cWPKI Certificate Verification Scheme Based on Certificate Digest Signature-Online Certificate Status Protocol,\u201d Mathematical Problems in Engineering, 2018. 10.1155\/2018\/7379364","DOI":"10.1155\/2018\/7379364"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[16] G.-J. Ra and I.-Y. Lee, \u201cA study on KSI-based authentication management and communication for secure smart home environments,\u201d KSII Transactions on Internet and Information Systems (TIIS), vol.12, no.2, pp.892-905, 2018. 10.3837\/tiis.2018.02.021","DOI":"10.3837\/tiis.2018.02.021"},{"key":"16","unstructured":"[17] T. Chow, W. Wong, Y. Rouskov, K.W. Chan, W. Jiang, C. Chow, and A. Belur, \u201cShort-lived certificate authority service,\u201d US Patent No.7,853,995, 2010."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[18] Y.-C. Hu, M. Jakobsson, and A. Perrig, \u201cEfficient constructions for one-way hash chains,\u201d In International Conference on Applied Cryptography and Network Security, pp.423-441, Springer, 2005. 10.1007\/11496137_29","DOI":"10.1007\/11496137_29"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[19] A. Buldas, A. Kroonmaa, and R. Laanoja, \u201cKeyless signatures&apos; infrastructure: How to build global distributed hash-trees,\u201d In Nordic Conference on Secure IT Systems an Introduction to Signal Detection and Estimation, New York: Springer-Verlag, 1985, ch. 4, pp.313-320, 2013. 10.1007\/978-3-642-41488-6_21","DOI":"10.1007\/978-3-642-41488-6_21"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[20] H. Wang, X. Li, J. Gao, and W. Li, \u201cMOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions,\u201d Future Generation Computer Systems, pp.101, 315-326, 2019. 10.1016\/j.future.2019.04.055","DOI":"10.1016\/j.future.2019.04.055"},{"key":"20","unstructured":"[21] Buldas, R. Laanoja, and A. Truu, \u201cEfficient implementation of keyless signatures with hash sequence authentication,\u201d IACR Cryptology ePrint Archive 689, 2014."},{"key":"21","unstructured":"[22] Buldas, R. Laanoja, and A. Truu, \u201cEfficient quantum-immune keyless signatures with identity,\u201d IACR Cryptology ePrint Archive 321, 2014."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[23] C. J\u00e4mthagen and M. Hell, \u201cBlockchain-based publishing layer for the Keyless Signing Infrastructure,\u201d In 2016 Intl IEEE Conferences Ubiquitous Intelligence, and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), pp.374-381, IEEE, 2016. 10.1109\/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0072","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0072"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[24] F. Li and P. Liu, \u201cAn efficient certificateless signature scheme from bilinear paring,\u201d In 2011 International Conference on Network Computing and Information Security (NCIS), vol.1, pp.35-37, IEEE, 2011. 10.1109\/ncis.2011.15","DOI":"10.1109\/NCIS.2011.15"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[25] E. Alkim, N. Bindel, J. Buchmann, \u00d6. Dagdelen, E. Eaton, G. Gutoski, J. Kr\u00e4mer, and F. Pawlega, \u201cFRevisiting TESLA in the quantum random oracle model,\u201d In International Workshop on Post-Quantum Cryptography, pp.143-162, 2017. 10.1007\/978-3-319-59879-6_9","DOI":"10.1007\/978-3-319-59879-6_9"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[26] C.I. Fan, Y.F. Tseng, H.P. Su, R.H. Hsu, and H. Kikuchi, \u201cSecure hierarchical bitcoin wallet scheme against privilege escalation attacks,\u201d International Journal of Information Security, vol.19, no.3, pp.245-255, 2020.","DOI":"10.1007\/s10207-019-00476-5"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[27] C. Yuan, M.-X. Xu, and X.-M. Si, \u201cResearch on a New Signature Scheme on Blockchain,\u201d Security and Communication Networks, 2017.","DOI":"10.1155\/2017\/4746586"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[28] G. Ra, D. Seo, M.Z.A. Bhuiyan, and I. Lee, \u201cAn Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain,\u201d Electronics, vol.9, no.8, p.1183, 2020. 10.3390\/electronics9081183","DOI":"10.3390\/electronics9081183"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[29] X. Luo, X. Yang, and X. Niu, \u201cAn efficient and secure outsourcing algorithm for bilinear pairing computation,\u201d In International Conference on Emerging Internetworking, Data &amp; Web Technologies, pp.328-339, Springer, Cham, 2017. 10.1007\/978-3-319-59463-7_33","DOI":"10.1007\/978-3-319-59463-7_33"},{"key":"29","unstructured":"[30] M. Zuppelli, A. Carrega, and M. Repetto, \u201cAn effective and efficient approach to improve visibility,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol.12, no.4, pp.89-108, 2021."},{"key":"30","unstructured":"[31] M. El-Shrkawey, M. Alalfi, and H. Al-Mahdi, \u201cAn enhanced intrusion detection system based on multi-layer feature reduction for probe and DoS attacks,\u201d Journal of Internet Services and Information Security (JISIS), vol.11, no.4, pp.61-78, 2021."},{"key":"31","unstructured":"[32] L. Caviglione, S. Wendzel, A. Mileva, and S. Vrhovec, \u201cGuest editorial: Multidisciplinary solutions to modern cybersecurity challenges,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol.12, no.4, pp.1-3, 2021."},{"key":"32","unstructured":"[33] \u017d. Kodri\u010d, S. Vrhovec, and L. Jelov\u010dan, \u201cSecuring edge-enabled smart healthcare systems with blockchain: A systematic literature reviews,\u201d Journal of Internet Services and Information Security(JISIS), vol.11, no.4, pp.19-32, 2021."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/11\/E105.D_2022NGP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T23:51:30Z","timestamp":1728258690000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/11\/E105.D_2022NGP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":32,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2022ngp0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"article-number":"2022NGP0003"}}