{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T23:10:30Z","timestamp":1769641830245,"version":"3.49.0"},"reference-count":59,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p>Edge computing is a significant paradigm that can provide message aggregation and message verification with low time delay. To overcome the limitation of computation ability in one edge node, collaborative edge computing is proposed. Each edge node only needs to verify a subset of the message integrity, which is beneficial when incoming messages are large. In this paper, we propose an Elliptic Curve Based Multi-hop Sanitizable Signature (ECMSS), which can provide both signature aggregation and subset verification. The theoretical analysis shows that ECMSS can achieve unforgeability and non-transferability. Concurrently, the experimental results show that our proposed scheme achieves high efficiency and guaranteed security.<\/jats:p>","DOI":"10.3233\/jcs-230107","type":"journal-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T10:55:47Z","timestamp":1717152947000},"page":"79-99","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-hop sanitizable signature for collaborative edge computing"],"prefix":"10.1177","volume":"33","author":[{"given":"Haotian","family":"Yan","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hongkong, China"}]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hongkong, China"}]},{"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hongkong, China"}]},{"given":"Jianliang","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Hong Kong Baptist University, Hongkong, China"}]}],"member":"179","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Ateniese G. Chou D.H. Medeiros B.D. Tsudik G. Sanitizable signatures in: European Symposium on Research in Computer Security Springer 2005 pp. 159\u2013177.","DOI":"10.1007\/11555827_10"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Ateniese G. Hohenberger S. Proxy re-signatures: New definitions algorithms and applications in: Proceedings of the 12th ACM Conference on Computer and Communications Security 2005 pp. 310\u2013319. doi:10.1145\/1102120.1102161.","DOI":"10.1145\/1102120.1102161"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1993-1199989-X"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1095408.1095420"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1997-5104"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4960964"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Chen X. Zhang F. Kim K. Chameleon hashing without key exposure in: International Conference on Information Security Springer 2004 pp. 87\u201398. doi:10.1007\/978-3-540-30144-8_8.","DOI":"10.1007\/978-3-540-30144-8_8"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Chen Y. Zhao Y. Half-aggregation of Schnorr signatures with tight reductions in: Computer Security\u2013ESORICS 2022: 27th European Symposium on Research in Computer Security Copenhagen Denmark September 26\u201330 2022 Proceedings Part II Springer 2022 pp. 385\u2013404.","DOI":"10.1007\/978-3-031-17146-8_19"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2766330.2766337"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Doerner J. Kondi Y. Lee E. Shelat A. Secure two-party threshold ecdsa from ecdsa assumptions in: 2018 IEEE Symposium on Security and Privacy (SP) IEEE 2018 pp. 980\u2013997. doi:10.1109\/SP.2018.00036.","DOI":"10.1109\/SP.2018.00036"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Du J. Xu F. Zhang C. Zhang Z. Liu X. Ren P. Diao W. Guo S. Zhang K. Identifying the ble misconfigurations of iot devices through companion mobile apps in: 2022 19th Annual IEEE International Conference on Sensing Communication and Networking (SECON) IEEE 2022 pp. 343\u2013351. doi:10.1109\/SECON55815.2022.9918597.","DOI":"10.1109\/SECON55815.2022.9918597"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Eltayieb N. Elhabob R. Aftab M.U. Kuleev R. Mazzara M. Ahmad M. Secure aggregate signature scheme for smart city applications Computer Communications (2022).","DOI":"10.1016\/j.comcom.2022.07.050"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Erroutbi A. El Hanjri A. Sekkaki A. Secure and lightweight hmac mutual authentication protocol for communication between iot devices and fog nodes in: 2019 IEEE International Smart Cities Conference (ISC2) IEEE 2019 pp. 251\u2013257. doi:10.1109\/ISC246665.2019.9071788.","DOI":"10.1109\/ISC246665.2019.9071788"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Gaballah S.A. Coijanovic C. Strufe T. M\u00fchlh\u00e4user M. 2pps\u2014publish\/subscribe with provable privacy in: 2021 40th International Symposium on Reliable Distributed Systems (SRDS) IEEE 2021 pp. 198\u2013209. doi:10.1109\/SRDS53918.2021.00028.","DOI":"10.1109\/SRDS53918.2021.00028"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986015"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.277"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Gura N. Patel A. Wander A. Eberle H. Shantz S.C. Comparing elliptic curve cryptography and rsa on 8-bit cpus in: International Workshop on Cryptographic Hardware and Embedded Systems Springer 2004 pp. 119\u2013132.","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2649687"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3129902"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2926979"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2797922"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Hu H. Chen Q. Xu J. Verdict: Privacy-preserving authentication of range queries in location-based services in: 2013 IEEE 29th International Conference on Data Engineering (ICDE) IEEE 2013 pp. 1312\u20131315.","DOI":"10.1109\/ICDE.2013.6544932"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2683492"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Hu H. Xu J. Xu X. Pei K. Choi B. Zhou S. Private search on key-value stores with hierarchical indexes in: 2014 IEEE 30th International Conference on Data Engineering IEEE 2014 pp. 628\u2013639. doi:10.1109\/ICDE.2014.6816687.","DOI":"10.1109\/ICDE.2014.6816687"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878876"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901011"},{"key":"e_1_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Jia M. Chen J. He K. Du R. Zheng L. Lai M. Wang D. Liu F. Redactable blockchain from decentralized chameleon hash functions IEEE Transactions on Information Forensics and Security (2022).","DOI":"10.1109\/TIFS.2022.3192716"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Johnson R. Molnar D. Song D. Wagner D. Homomorphic signature schemes in: Cryptographers\u2019 Track at the RSA Conference Springer 2002 pp. 244\u2013262.","DOI":"10.1007\/3-540-45760-7_17"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Krawczyk H. Bellare M. Canetti R. Hmac: Keyed-hashing for message authentication 1997 Tech. Rep.","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_2_33_2","unstructured":"Krawczyk H. Rabin T. Chameleon hashing and signatures 1998."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Kumar K.M. Sunitha N. Hybrid cryptographically secure pseudo-random bit generator in: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) IEEE 2016 pp. 296\u2013301. doi:10.1109\/IC3I.2016.7917978.","DOI":"10.1109\/IC3I.2016.7917978"},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Kurosawa K. Heng S.-H. From digital signature to id-based identification\/signature in: Public Key Cryptography\u2013PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography Singapore March 1\u20134 2004 Proceedings 7 Springer 2004 pp. 248\u2013261.","DOI":"10.1007\/978-3-540-24632-9_18"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Li S. Han J. Tong D. Cui J. Redactable signature-based public auditing scheme with sensitive data sharing for cloud storage IEEE Systems Journal (2022).","DOI":"10.1109\/JSYST.2022.3159832"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Li T. Chen W. Tang Y. Yan H. A homomorphic network coding signature scheme for multiple sources and its application in iot Security and communication networks 2018 (2018).","DOI":"10.1155\/2018\/9641273"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809426"},{"issue":"2","key":"e_1_3_2_39_2","first-page":"2169","article-title":"Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks","volume":"24","author":"Liu L.","year":"2022","unstructured":"Liu L., Zhao M., Yu M., Jan M.A., Lan D., Taherkordi A., Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks, IEEE Transactions on Intelligent Transportation Systems 24(2) (2022), 2169\u20132182.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Liu Y. Wang S. Huang J. Yang F. A computation offloading algorithm based on game theory for vehicular edge networks in: 2018 IEEE International Conference on Communications (ICC) IEEE 2018 pp. 1\u20136.","DOI":"10.1109\/ICC.2018.8422240"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Liu Z. Ren L. Li R. Liu Q. Zhao Y. Id-based sanitizable signature data integrity auditing scheme with privacy-preserving Computers & Security 121 (2022) 102858. doi:10.1016\/j.cose.2022.102858.","DOI":"10.1016\/j.cose.2022.102858"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Luo F. Al-Kuwari S. Susilo W. Duong D.H. Attribute-based proxy re-signature from standard lattices and its applications Computer Standards & Interfaces 75 (2021) 103499. doi:10.1016\/j.csi.2020.103499.","DOI":"10.1016\/j.csi.2020.103499"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844406"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2949708"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","unstructured":"P\u00f6hls H.C. Samelin K. Accountable redactable signatures in: 2015 10th International Conference on Availability Reliability and Security IEEE 2015 pp. 60\u201369. doi:10.1109\/ARES.2015.10.","DOI":"10.1109\/ARES.2015.10"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Rausch T. Avasalcai C. Dustdar S. Portable energy-aware cluster-based edge computers in: 2018 IEEE\/ACM Symposium on Edge Computing (SEC) IEEE 2018 pp. 260\u2013272. doi:10.1109\/SEC.2018.00026.","DOI":"10.1109\/SEC.2018.00026"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3042224"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Samelin K. Slamanig D. Policy-based sanitizable signatures in: Topics in Cryptology\u2013CT-RSA 2020: The Cryptographers\u2019 Track at the RSA Conference 2020 San Francisco CA USA February 24\u201328 2020 Proceedings Springer 2020 pp. 538\u2013563.","DOI":"10.1007\/978-3-030-40186-3_23"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.042"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Shao M. Liul Y. Duo B. Ning J. Luo J. Zhu X. Liu M. Wang Z. Joint passive beamforming and elevation angle-dependent trajectory design for ris-aided uav-enabled wireless sensor networks in: 2022 19th Annual IEEE International Conference on Sensing Communication and Networking (SECON) IEEE 2022 pp. 488\u2013496. doi:10.1109\/SECON55815.2022.9918587.","DOI":"10.1109\/SECON55815.2022.9918587"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Sliti M. Hamdi M. Boudriga N. An elliptic threshold signature framework for k-security in wireless sensor networks in: 2008 15th IEEE International Conference on Electronics Circuits and Systems IEEE 2008 pp. 226\u2013229. doi:10.1109\/ICECS.2008.4674832.","DOI":"10.1109\/ICECS.2008.4674832"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895593"},{"key":"e_1_3_2_53_2","unstructured":"Trivedi A. Wang L. Bal H. Iosup A. Sharing and caring of data at the edge in: 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20) 2020."},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3026033"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951687"},{"key":"e_1_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Yan H. Hu H. Ye Q. Tang L. Spmac: Scalable prefix verifiable message authentication code for internet of things IEEE Transactions on Network and Service Management (2022).","DOI":"10.1109\/TNSM.2022.3169657"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633522"},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Zhang P. Wang L. Wang W. Fu K. Wang J. A blockchain system based on quantum-resistant digital signature Security and Communication Networks 2021 (2021).","DOI":"10.1155\/2021\/6671648"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Zhang X. Wang Y. Lu S. Liu L. Shi W.et al. Openei: An open framework for edge intelligence in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) IEEE 2019 pp. 1840\u20131851. doi:10.1109\/ICDCS.2019.00182.","DOI":"10.1109\/ICDCS.2019.00182"},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Zhong H. Wang L. Cui J. Zhang J. Bolodurina I. Secure edge computing-assisted video reporting service in 5g-enabled vehicular networks IEEE Transactions on Information Forensics and Security (2023).","DOI":"10.1109\/TIFS.2023.3287731"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-230107","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-230107","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-230107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T10:20:44Z","timestamp":1769595644000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-230107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,31]]},"references-count":59,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.3233\/JCS-230107"],"URL":"https:\/\/doi.org\/10.3233\/jcs-230107","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,31]]}}}