{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:19:30Z","timestamp":1775225970677,"version":"3.50.1"},"reference-count":53,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T00:00:00Z","timestamp":1722124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Guiyang City Science and Technology Plan Project","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Guiyang City Science and Technology Plan Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Guiyang City Science and Technology Plan Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"Guiyang City Science and Technology Plan Project","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"Guiyang City Science and Technology Plan Project","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"Guiyang City Science and Technology Plan Project","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"National Natural Science Foundation of China","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"National Natural Science Foundation of China","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"National Natural Science Foundation of China","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"National Natural Science Foundation of China","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"National Natural Science Foundation of China","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"National Natural Science Foundation of China","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"Guizhou Normal University Academic New Seedling Fund Project","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["61962011"],"award-info":[{"award-number":["61962011"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["QianShiXinMiao[2021]B09"],"award-info":[{"award-number":["QianShiXinMiao[2021]B09"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A Wireless Body Area Network (WBAN), introduced into the healthcare sector to improve patient care and enhance the efficiency of medical services, also brings the risk of the leakage of patients\u2019 privacy. Therefore, maintaining the communication security of patients\u2019 data has never been more important. However, WBAN faces issues such as open medium channels, resource constraints, and lack of infrastructure, which makes the task of designing a secure and economical communication scheme suitable for WBAN particularly challenging. Signcryption has garnered attention as a solution suitable for resource-constrained devices, offering a combination of authentication and confidentiality with low computational demands. Although the advantages offered by existing certificateless signcryption schemes are notable, most of them only have proven security within the random oracle model (ROM), lack public ciphertext authenticity, and have high computational overheads. To overcome these issues, we propose a certificateless anonymous signcryption (CL-ASC) scheme suitable for WBAN, featuring anonymity of the signcrypter, public verifiability, and public ciphertext authenticity. We prove its security in the standard model, including indistinguishability, unforgeability, anonymity of the signcrypter, and identity identifiability, and demonstrate its superiority over relevant schemes in terms of security, computational overheads, and storage costs.<\/jats:p>","DOI":"10.3390\/s24154899","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T12:27:43Z","timestamp":1722256063000},"page":"4899","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Certificateless Anonymous Signcryption Scheme for WBAN"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7736-8000","authenticated-orcid":false,"given":"Weifeng","family":"Long","sequence":"first","affiliation":[{"name":"School of Mathematical Sciences, Xiamen University, Xiamen 361005, China"},{"name":"Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, School of Mathematical Sciences, Guizhou Normal University, Gui\u2019an New District, Guiyang 550025, China"}]},{"given":"Lunzhi","family":"Deng","sequence":"additional","affiliation":[{"name":"Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, School of Mathematical Sciences, Guizhou Normal University, Gui\u2019an New District, Guiyang 550025, China"}]},{"given":"Jiwen","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Xiamen University, Xiamen 361005, China"}]},{"given":"Yan","family":"Gao","sequence":"additional","affiliation":[{"name":"Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, School of Mathematical Sciences, Guizhou Normal University, Gui\u2019an New District, Guiyang 550025, China"}]},{"given":"Tianxiu","family":"Lu","sequence":"additional","affiliation":[{"name":"Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, School of Mathematical Sciences, Guizhou Normal University, Gui\u2019an New District, Guiyang 550025, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Reichman, A. (2009, January 9\u201311). Standardization of body area networks. Proceedings of the 2009 IEEE International Conference on Microwaves, Communications, Antennas and Electronics Systems, Tel Aviv, Israel.","DOI":"10.1109\/COMCAS.2009.5385994"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1109\/JSEN.2013.2271721","article-title":"A Cyber Physical Test-Bed for Virtualization of RF Access Environment for Body Sensor Network","volume":"13","author":"He","year":"2013","journal-title":"IEEE. Sens. J."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Liu, D., Geng, Y., Liu, G., Zhou, M., and Pahlavan, K. (2015, January 6\u20139). WBANs-Spa: An Energy Efficient Relay Algorithm for Wireless Capsule Endoscopy. Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference, Boston, MA, USA.","DOI":"10.1109\/VTCFall.2015.7391190"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/JBHI.2013.2268897","article-title":"A Novel and Lightweight System to Secure Wireless Medical Sensor Networks","volume":"18","author":"He","year":"2014","journal-title":"IEEE J. Biomed. Health"},{"key":"ref_5","first-page":"13","article-title":"Future and Challenges of Internet of Things","volume":"10","author":"Jindal","year":"2018","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Limbasiya, T., and Karati, A. (2018, January 10\u201312). Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things. Proceedings of the 2018 International Conference on Information Networking, Chiang Mai, Thailand.","DOI":"10.1109\/ICOIN.2018.8343105"},{"key":"ref_7","unstructured":"(2024, July 19). ACM Code of Ethics and Professional Conduct. Available online: https:\/\/www.acm.org\/diversity-inclusion\/code-of-ethics."},{"key":"ref_8","unstructured":"(2024, July 19). Reporting and Whistleblower Policy. Available online: http:\/\/www.maa.org\/about-maa\/policies-and-procedures."},{"key":"ref_9","unstructured":"(2024, July 19). Ethical Guidelines of the American Mathematical Society. Available online: https:\/\/www.ams.org\/about-us\/governance\/policy-statements\/sec-ethics."},{"key":"ref_10","unstructured":"(2015, January 2). Phillip Rogaway. The Moral Character of Cryptographic Work. Proceedings of the Asiacrypt 2015, Auckland, New Zealand."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997, January 17\u201321). Digital signcryption or how to achieve cost(signature & encryption) \u2264 cost(signature) + cost(encryption). Proceedings of the 17th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0052234"},{"key":"ref_12","unstructured":"Cagalaban, G., and Kim, S. (2011, January 13\u201316). Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, Republic of Korea."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","article-title":"Authentication Protocol for an Ambient Assisted Living System","volume":"53","author":"He","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","article-title":"Certificateless remote anonymous authentication schemes for wireless body area networks","volume":"25","author":"Liu","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1002\/sec.777","article-title":"Distributed access control with adaptive privacy preserving property for wireless sensor networks","volume":"7","author":"Ma","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Malone-Lee, J., and Mao, W. (2003). Two Birds One Stone: Signcryption Using RSA. Lecture Notes in Computer Science, Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/3-540-36563-X_14"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","article-title":"Data Security and pricacy in wireless body wireless body area networks","volume":"17","author":"Li","year":"2010","journal-title":"IEEE. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., and Chow, K.P. (2004, January 20\u201322). Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Proceedings of the International Conference on Information Security and Cryptology, Chennai, India.","DOI":"10.1007\/978-3-540-24691-6_26"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hu, C., Zhang, F., Cheng, X., Liao, X., and Chen, D. (2013, January 19). Securing communications between external users and wireless body area networks. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, New York, NY, USA.","DOI":"10.1145\/2463183.2463191"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., and Paterson, K.G. (2003). Certificateless Public Key Cryptography. ASIACRYPT 03, Springer.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"935","DOI":"10.5755\/j01.itc.52.4.33765","article-title":"Cbeet: Constructing certificate-based encryption with equality test in the cb-pks","volume":"52","author":"Tsai","year":"2023","journal-title":"Inf. Technol. Control"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"638","DOI":"10.5755\/j01.itc.51.4.30691","article-title":"Revocable certificateless public key encryption with equality test","volume":"51","author":"Tsai","year":"2022","journal-title":"Inf. Technol. Control"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Barbosa, M., and Farshim, P. (2008, January 18\u201320). Certificateless signcryption. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/1368310.1368364"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","article-title":"Certificateless signcryption scheme in the standard model","volume":"180","author":"Liu","year":"2010","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.4304\/jcp.8.7.1853-1860","article-title":"An Efficient Biometric Certificateless Signcryption Scheme","volume":"8","author":"Luo","year":"2013","journal-title":"J. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Issac, B., and Israr, N. (2014). Case Studies in Secure Computing: Achievements and Trends, Taylor and Francis. [1st ed.].","DOI":"10.1201\/b17352"},{"key":"ref_27","first-page":"81","article-title":"A More Efficient and Secure Broadcast Signcryption Scheme Using Certificateless Public-Key Cryptography for Resource-Constrained Networks","volume":"17","author":"Luo","year":"2016","journal-title":"J. Internet Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2693","DOI":"10.1007\/s11277-017-4995-4","article-title":"An Enhanced Certificateless Signcryption in the Standard Model","volume":"98","author":"Luo","year":"2017","journal-title":"Wireless. Pers. Commun."},{"key":"ref_29","first-page":"463","article-title":"Certificateless public key encryption secure against malicious KGC attacks in the standard model","volume":"14","author":"Hwang","year":"2008","journal-title":"J. Univers. Comput. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/cje.2018.06.002","article-title":"Certificateless Signcryption Scheme Without Random Oracles","volume":"27","author":"Zhou","year":"2018","journal-title":"Chin. J. Electrons"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"e3796","DOI":"10.1002\/dac.3796","article-title":"Certificateless short signature scheme from pairing in the standard model","volume":"31","author":"Deng","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1002\/sec.1146","article-title":"Certificateless online\/offline signcryption scheme","volume":"8","author":"Li","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Rogaway, P. (1993, January 3\u20135). Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the 1st ACM conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/168588.168596"},{"key":"ref_34","unstructured":"Selvi, S.S.D., Vivek, S.S., and Rangan, C.P. (2024, July 25). Security Weaknesses in Two Certificateless Signcryption Schemes. Available online: https:\/\/eprint.iacr.org\/2010\/092."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.ins.2011.11.045","article-title":"On security of a certificateless signcryption scheme","volume":"232","author":"Miao","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.ins.2010.09.037","article-title":"Cryptanalysis of a certificateless signcryption scheme in the standard model","volume":"181","author":"Weng","year":"2011","journal-title":"Inf. Sci."},{"key":"ref_37","unstructured":"Jin, Z.P., Wen, Q.Y., and Zhang, H. (2024, July 25). A Supplement to Liu et al.\u2019s Certificateless Signcryption Scheme in the Standard Model. Available online: https:\/\/eprint.iacr.org\/2010\/252."},{"key":"ref_38","unstructured":"Xiong, H. (2024, July 25). Toward Certificateless Signcryption Scheme Without Random Oracles. Available online: http:\/\/eprint.iacr.org\/2014\/162."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11277-020-07031-9","article-title":"Security Analysis of an Enhanced Certificateless Signcryption in the Standard Model","volume":"112","author":"Yuan","year":"2020","journal-title":"Wireless. Pers. Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1093\/comjnl\/bxz041","article-title":"Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan\u2019s Scheme from Wireless Personal Communications (2018)","volume":"62","author":"Rastegari","year":"2019","journal-title":"Comput. J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1093\/comjnl\/bxz157","article-title":"On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model","volume":"63","author":"Lin","year":"2020","journal-title":"Comput. J."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., and Yang, G. (2007, January 20\u201322). Malicious KGC attacks in certificateless cryptography. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007). ACM, Singapore.","DOI":"10.1145\/1229285.1266997"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5389","DOI":"10.1109\/JSEN.2016.2554625","article-title":"Efficient Certificateless Access Control for Wireless Body Area Networks","volume":"16","author":"Li","year":"2016","journal-title":"IEEE. Sens. J."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Hussain, S., Ullah, S.S., Uddin, M., Iqbal, J., and Chen, C.-L. (2022). A comprehensive survey on signcryption security mechanisms in wireless body area networks. Sensors, 22.","DOI":"10.3390\/s22031072"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/JSYST.2016.2557850","article-title":"Cost-Effective and Anonymous Access Control for Wireless Body Area Networks","volume":"12","author":"Li","year":"2018","journal-title":"IEEE. Syst. J."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1504\/IJSNET.2018.088384","article-title":"A traceable threshold attribute-based signcryption for mhealthcare social network","volume":"26","author":"Lu","year":"2018","journal-title":"Int. J. Sens. Netw."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.comcom.2020.08.014","article-title":"An efficient and practical certificateless signcryption scheme for wireless body area networks","volume":"162","author":"Liu","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the Weil pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"Siam. J. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"15953","DOI":"10.1109\/JIOT.2023.3266335","article-title":"Certificateless Anonymous Signcryption Scheme With Provable Security in the Standard Model Suitable for Healthcare Wireless Sensor Networks","volume":"10","author":"Deng","year":"2023","journal-title":"IEEE. Internet Things"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"10431","DOI":"10.1109\/JIOT.2019.2939204","article-title":"Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained iot devices","volume":"6","author":"Karati","year":"2019","journal-title":"IEEE. Internet Things"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Luo, M., Tu, M., and Xu, J. (2014). A security communication model based on certificateless online\/offline signcryption for internet of things. Security and Communication Networks, Wiley.","DOI":"10.1002\/sec.836"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","article-title":"Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures","volume":"11","author":"He","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s11277-016-3554-8","article-title":"Certificateless Signcryption in the Standard Model","volume":"92","author":"Zhou","year":"2017","journal-title":"Wireless. Pers. Commun."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4899\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:25:24Z","timestamp":1760109924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,28]]},"references-count":53,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["s24154899"],"URL":"https:\/\/doi.org\/10.3390\/s24154899","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,28]]}}}