{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:45:16Z","timestamp":1773161116295,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540007166","type":"print"},{"value":"9783540365525","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_2","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"16-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption"],"prefix":"10.1007","author":[{"given":"Ik","family":"Rae Jeong","sequence":"first","affiliation":[]},{"given":"Hee","family":"Yun Jeong","sequence":"additional","affiliation":[]},{"given":"Hyun","family":"Sook Rhee","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Hoon Lee","sequence":"additional","affiliation":[]},{"given":"Jong","family":"In Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"2_CR1","unstructured":"J.H. An. Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses. Report 2001\/079, Cryptology ePrint Archive, \n                    http:\/\/eprint.iacr.org\/\n                    \n                  , 2001. 16, 17, 18"},{"key":"2_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"CT-RSA 2001","author":"M. Abdalla","year":"2001","unstructured":"M. Abdalla, M. Bellare, and P. Rogaway. The Oracle Diffie-Hellman assumptions and an analysis of DHIES. CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 143\u2013158. Springer Verlag, 2001. 19"},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology-EUROCRYPT 2002","author":"J.H. An","year":"2002","unstructured":"J.H. An, Y. Dodis, and T. Rabin. On the Security of Joint Signature and Encryption. Advances in Cryptology-EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83\u2013107, Springer Verlag, 2002. 17, 18"},{"key":"2_CR4","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of DES Modes of Operation. Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. 19"},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u201998","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. Advances in Cryptology-Crypto\u201998, volume 1462 of Lecture Notes in Computer Science, Springer Verlag, 1998."},{"key":"2_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology-Asiacrypt 2000","author":"M. Bellare","year":"2000","unstructured":"M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Advances in Cryptology-Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 531\u2013545, Springer Verlag, 2000. 16, 17, 18, 19"},{"key":"2_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45664-3_6","volume-title":"Public Key Cryptography 2002","author":"J. Baek","year":"2002","unstructured":"J. Baek, R. Steinfeld, and Y. Zheng. Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002, volume 2274 of Lecture Notes in Computer Science, pages 80\u201398, Springer Verlag, 2002. 18"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"W.-H. He and T.-C. Wu. Cryptanalysis and improvement of Petersen-Michels signcryption schemes. IEE Proc.-Computers and Digital Techniques, 146(2): pp. 123\u2013124, 1999. 16","DOI":"10.1049\/ip-cdt:19990198"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"P. Horster, M. Michels, and H. Petersen. Authenticated encryption schemes with low communication costs. Technical Report TR-94-2-R, University of Technology, Chemnitz-Zwickau, 1994. appeared in Electronic Letters, Vol. 30, No. 15, 1994. 16, 18","DOI":"10.1049\/el:19940856"},{"key":"2_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_19","volume-title":"Advances in Cryptology-Crypto 2001","author":"H. Krawczyk","year":"2001","unstructured":"H. Krawczyk. The order of encryption and authentication for protecting communications (Or: how secure is SSL?). Advances in Cryptology-Crypto 2001, volume 2139 of Lecture Notes in Computer Science, Springer Verlag, 2001."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"J. Katz and M. Yung. Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Proceedings of the 32nd Annual Symposium on the Theory of Computing, ACM, 2000. 19","DOI":"10.1145\/335305.335335"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"H. Petersen and M. Michels. Cryptanalysis and improvement of signcryption schemes. IEE Proc.-Computers and Digital Techniques, 145(2), pp. 149\u2013151, 1998. 16","DOI":"10.1049\/ip-cdt:19981862"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"David Pointcheval and Jacques Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13(3), pp. 361\u2013396, 2000. 25","journal-title":"Journal of Cryptology"},{"key":"2_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology-Crypto\u201997","author":"Y. Zheng","year":"1997","unstructured":"Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) \u226a cost(signature) + cost(encryption). Advances in Cryptology-Crypto\u201997, volume 1294 of Lecture Notes in Computer Science, pages 165\u2013179, Springer Verlag, 1997. 16, 18"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:45:19Z","timestamp":1558273519000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}