| Citation: | YU Huifang, WANG Qinggui, WANG Zihao. Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250750 |
| [1] |
LIU Jianhang, XUE Kunlei, MIAO Qinghai, et al. MCVCO: Multi-MEC cooperative vehicular computation offloading[J]. IEEE Transactions on Intelligent Vehicles, 2024, 9(1): 813–826. doi: 10.1109/TIV.2023.3299381.
|
| [2] |
HADDAJI A, AYED S, and CHAARI FOURATI L. IoV security and privacy survey: Issues, countermeasures, and challenges[J]. The Journal of Supercomputing, 2024, 80(15): 23018–23082. doi: 10.1007/s11227-024-06269-5.
|
| [3] |
TANG Chaogang, CHEN Wei, ZHU Chunsheng, et al. When cache meets vehicular edge computing: Architecture, key issues, and challenges[J]. IEEE Wireless Communications, 2022, 29(4): 56–62. doi: 10.1109/MWC.202.2100159.
|
| [4] |
QUAN Haoyu, ZHANG Qingmiao, and ZHAO Junhui. Federated learning assisted intelligent IoV mobile edge computing[J]. IEEE Transactions on Green Communications and Networking, 2025, 9(1): 228–241. doi: 10.1109/TGCN.2024.3421357.
|
| [5] |
DAMSGAARD H J, OMETOV A, and NURMI J. Approximation opportunities in edge computing hardware: A systematic literature review[J]. ACM Computing Surveys, 2023, 55(12): 252. doi: 10.1145/3572772.
|
| [6] |
董裕民, 张静, 谢昌佐, 等. 云边端架构下边缘智能计算关键问题综述: 计算优化与计算卸载[J]. 电子与信息学报, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.
DONG Yumin, ZHANG Jing, XIE Changzuo, et al. A survey of key issues in edge intelligent computing under cloud-edge-terminal architecture: Computing optimization and computing offloading[J]. Journal of Electronics & Information Technology, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.
|
| [7] |
DENG Ningzhi, DENG Shaojiang, HU Chunqiang, et al. An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing[J]. IEEE Access, 2020, 8: 42805–42815. doi: 10.1109/ACCESS.2019.2963233.
|
| [8] |
YU Huifang and BAI Xiaoping. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(3): 461–471. doi: 10.1631/FITEE.2300248.
|
| [9] |
牛淑芬, 王卫芳, 董润园, 等. 云边协同下支持等值测试的属性基广播签密方案[J]. 计算机科学与探索, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.
NIU Shufen, WANG Weifang, DONG Runyuan, et al. Attribute-based broadcast signcryption scheme with equivalence testing support under cloud-edge collaboration[J]. Journal of Frontiers of Computer Science and Technology, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.
|
| [10] |
牛淑芬, 周思玮, 吕锐曦, 等. 医疗社交网络中基于云计算的属性基签密方案[J]. 电子与信息学报, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.
NIU Shufen, ZHOU Siwei, LÜ Ruixi, et al. Attribute-base signcryption scheme based on cloud computing in mobile medical social network[J]. Journal of Electronics & Information Technology, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.
|
| [11] |
ELTAYIEB N, ELHABOB R, HASSAN A, et al. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud[J]. Journal of Systems Architecture, 2020, 102: 101653. doi: 10.1016/j.sysarc.2019.101653.
|
| [12] |
万云飞, 彭长根, 谭伟杰, 等. 基于国密SM9的边云协同属性基签密方案[J]. 信息安全研究, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.
WAN Yunfei, PENG Changgen, TAN Weijie, et al. Edge cloud collaborative attribute-based signcryption scheme based on state secret SM9[J]. Journal of Information Security Research, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.
|
| [13] |
王惠, 王峥. 工业物联网中基于区块链的属性基签密方案[J]. 计算机工程与设计, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.
WANG Hui and WANG Zheng. Attribute based signcryption scheme based on blockchain in industrial internet of things[J]. Computer Engineering and Design, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.
|
| [14] |
赖建昌, 黄欣沂, 何德彪, 等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学: 信息科学, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.
LAI Jianchang, HUANG Xinyi, HE Debiao, et al. Security analysis of SM9 digital signature and key encapsulation[J]. Scientia Sinica Informationis, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.
|
| [15] |
QIAO Zirui, CAO Lei, ZHU Yasi, et al. DADD: Direct authentication with vehicles from different domains[J]. IEEE Transactions on Intelligent Transportation Systems, 2025, 26(10): 16811–16825. doi: 10.1109/TITS.2025.3575535.
|