2021
DOI: 10.1109/jiot.2021.3055843
|View full text |Cite
|
Sign up to set email alerts
|

SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 49 publications
0
12
0
Order By: Relevance
“…It has built a thinking mode of investment loan linkage and a complete financial ecosystem and has a relatively complete service closed-loop entrepreneurial service platform. Compared with traditional financial institutions such as commercial banks, Internet finance also has the advantages of fast transformation speed, strong innovation ability, low service cost, and high information transparency [23]. At the same time, Internet finance and technology finance are the most repetitive financial concepts.…”
Section: Internet Finance and Technology Finance Under The Inking Of ...mentioning
confidence: 99%
“…It has built a thinking mode of investment loan linkage and a complete financial ecosystem and has a relatively complete service closed-loop entrepreneurial service platform. Compared with traditional financial institutions such as commercial banks, Internet finance also has the advantages of fast transformation speed, strong innovation ability, low service cost, and high information transparency [23]. At the same time, Internet finance and technology finance are the most repetitive financial concepts.…”
Section: Internet Finance and Technology Finance Under The Inking Of ...mentioning
confidence: 99%
“…Here, we first provide the symbols used in the proposed scheme, as given in Table 1; then, the proposed scheme is defined in detail in the phases that follow [21]:…”
Section: Proposed Certificate-based Signature Schemementioning
confidence: 99%
“…and run signature generation oracle (. ); then, C send the resultant value to f 1 (ii) If I � g, then it selects ϕ I , f I , ϱ I , and C I randomly, and set N I � X I + Υ, f I � h o (ID I , V I ), and ϱ I � h p (V I , ID I , δ) Forgery: when we take Forking lemma [21] in account, C can output two signature that are (Z * , S * ) and (Z * * , S * * ), and we have the following computations:…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we will provide the performance analysis in terms of computational overhead, communication overhead, and security features. In the meantime, the efficiency of the improved scheme will be compared with the related schemes [ 15 , 24 , 25 , 27 , 29 , 33 , 34 ]. We utilize MIRACL library to simulate cryptographic operations on a Windows 10 laptop with an Intel i7–1195G7 @2.9 GHz processor and 8 GB of memory.…”
Section: Performance Evaluationmentioning
confidence: 99%