{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:04:35Z","timestamp":1773086675850,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540414162","type":"print"},{"value":"9783540444565","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_23","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"308-322","source":"Crossref","is-referenced-by-count":57,"title":["A Signcryption Scheme Based on Integer Factorization"],"prefix":"10.1007","author":[{"given":"Ron","family":"Steinfeld","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"23_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, A. Boldyreva, and S. Micali. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. In EUROCRYPT 2000, volume 1807 of LNCS, pages 259\u2013274, Berlin, 2000. Springer-Verlag."},{"key":"23_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"CRYPTO\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In CRYPTO\u201997, volume 1294 of LNCS, pages 425\u2013439, Berlin, 1997. Springer-Verlag."},{"key":"23_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45539-6_1","volume-title":"EUROCRYPT 2000","author":"S. Cavallar","year":"2000","unstructured":"S. Cavallar et al. Factorization of a 512-Bit RSA Modulus. In EUROCRYPT 2000, volume 1807 of LNCS, pages 1\u201318, Berlin, 2000. Springer-Verlag."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"U. Feige and A. Shamir. Witness Indistinguishable and Witness Hiding Protocols. In Proc. 22-nd STOC, pages 416\u2013426. ACM, 1990.","DOI":"10.1145\/100216.100272"},{"key":"23_CR5","unstructured":"FIPS 186-2, Digital Signature Standard. Federal Information Processing Standards Publication 186-2, 2000. Available from http:\/\/csrc.nist.gov\/ ."},{"key":"23_CR6","series-title":"Lect Notes Comput Sci","first-page":"490","volume-title":"EUROCRYPT\u2019 91","author":"M. Girault","year":"1992","unstructured":"M. Girault. Self-Certified Public Keys. In EUROCRYPT\u2019 91, volume 547 of LNCS, pages 490\u2013497, Berlin, 1992. Springer-Verlag."},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure against Adaptively Chosen Message Attacks. SIAM Journal on Computing, 17(2):281\u2013308, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"23_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-540-46588-1_30","volume-title":"PKC2000","author":"A. Lenstra","year":"2000","unstructured":"A. Lenstra and E. Verheul. Selecting Cryptographic Key Sizes. In PKC2000, volume 1751 of LNCS, pages 446\u2013465, Berlin, 2000. Springer-Verlag."},{"key":"23_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-46588-1_9","volume-title":"PKC2000","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval. The Composite Discrete Logarithm and Secure Authentication. In PKC2000, volume 1751 of LNCS, pages 113\u2013128, Berlin, 2000. Springer-Verlag."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. J. of Cryptology, 1999. Available from http:\/\/www.di.ens.fr\/\u223cpointche .","DOI":"10.1007\/s001450010003"},{"key":"23_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/BFb0054143","volume-title":"EUROCRYPT\u201998","author":"G. Poupard","year":"1998","unstructured":"G. Poupard and J. Stern. Security Analysis of a Practical \u201con the fly\u201d Authentication and Signature Generation. In EUROCRYPT\u201998, volume 1403 of LNCS, pages 422\u2013436, Berlin, 1998. Springer-Verlag."},{"key":"23_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-46588-1_11","volume-title":"PKC 2000","author":"G. Poupard","year":"2000","unstructured":"G. Poupard and J. Stern. Short Proofs of Knowledge for Factoring. In PKC 2000, volume 1751 of LNCS, pages 147\u2013166, Berlin, 2000. Springer-Verlag."},{"key":"23_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"CRYPTO\u201989","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr. Effficient Identification and Signatures for Smart Cards. In CRYPTO\u201989, volume 435 of LNCS, pages 239\u2013251, Berlin, 1990. Springer-Verlag."},{"key":"23_CR14","unstructured":"SEC2. Recommended Elliptic Curve Domain Parameters, September 2000. Standards for Efficient Cryptography Group. Available from http:\/\/www.secg.org\/ ."},{"key":"23_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"CRYPTO\u201997","author":"Y. Zheng","year":"1997","unstructured":"Y. Zheng. Digital Signcryption or How to Achieve Cost(Signature & Encryption) \u2018<\u2018< Cost(Signature) + Cost(Encryption). In CRYPTO\u201997, volume 1294 of LNCS, pages 165\u2013179, Berlin, 1997. Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:05:29Z","timestamp":1556816729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}