{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:12:32Z","timestamp":1742944352557,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":37,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_127","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:23Z","timestamp":1319723423000},"page":"588-594","source":"Crossref","is-referenced-by-count":0,"title":["Identity-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Beno\u00eet","family":"Libert","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"127_CR1_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in cryptology \u2013 Asiacrypt \u201905","author":"PSLM Barreto","year":"2005","unstructured":"Barreto PSLM, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in cryptology \u2013 Asiacrypt \u201905. Lecture notes in computer science, vol 3788. Springer, Heidelberg, pp 515\u2013532"},{"key":"127_CR2_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in cryptology \u2013 Eurocrypt \u201904","author":"M Bellare","year":"2004","unstructured":"Bellare M, Namprempre C, Neven G (2004) Security proofs for identity-based identification and signature schemes. In: Advances in cryptology \u2013 Eurocrypt \u201904. Lecture notes in computer science, vol 3027. Springer, Heidelberg, pp 268\u2013286"},{"key":"127_CR3_127","series-title":"Lecture notes in computer science","first-page":"309","volume-title":"Financial cryptography 2001","author":"M Bellare","year":"2001","unstructured":"Bellare M, Namprempre C, Pointcheval D, Semanko M (2001) The power of RSA inversion oracles and the security of Chaum\u2019s RSA-based blind signature scheme. In: Financial cryptography 2001. Lecture notes in computer science, vol 2339. Springer, Heidelberg, pp 309\u2013328"},{"key":"127_CR4_127","series-title":"Lecture notes in computer science","first-page":"145","volume-title":"RSA conference cryptographers\u2019 track (CT-RSA \u201907)","author":"M Bellare","year":"2007","unstructured":"Bellare M, Neven G (2007) Identity-based multi-signatures from RSA. In: RSA conference cryptographers\u2019 track (CT-RSA \u201907). Lecture notes in computer science, vol 4377. Springer, Heidelberg, pp 145\u2013162"},{"key":"127_CR5_127","first-page":"162","volume-title":"Advances in cryptology \u2013 Crypto \u201902, Lecture notes in computer science","author":"M Bellare","year":"2002","unstructured":"Bellare M, Palacio A (2002) GQ and schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks. In: Advances in cryptology \u2013 Crypto \u201902, Lecture notes in computer science, vol 2442. Springer, Heidelberg, pp 162\u2013177"},{"key":"127_CR6_127","first-page":"62","volume-title":"Random oracles are practical: a paradigm for designing efficient protocols","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, Fairfax, pp 62\u201373"},{"key":"127_CR7_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45961-8_7","volume-title":"Advances in cryptology \u2013 Eurocrypt \u201988","author":"T Beth","year":"1988","unstructured":"Beth T (1988) Efficient zero-knowledge identification scheme for smart cards. In: Advances in cryptology \u2013 Eurocrypt \u201988. Lecture notes in computer science, vol 330. Springer, Heidelberg, pp 77\u201384"},{"key":"127_CR8_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Identity based encryption from the Weil pairing, SIAM J of Comput 32(3): 586\u2013615, 2003","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M (2001) Identity based encryption from the Weil pairing, SIAM J of Comput 32(3): 586\u2013615, 2003. Earlier version in advances in cryptology \u2013 Crypto \u201901. Lecture notes in computer science, vol 2139. Springer, Heidelberg, pp 213\u2013229"},{"key":"127_CR9_127","first-page":"647","volume-title":"Space-efficient identity-based encryption without pairings","author":"D Boneh","year":"2007","unstructured":"Boneh D, Gentry C, Hamburg M (2007) Space-efficient identity-based encryption without pairings. In: Proceedings of the FOCS \u201907, Providence, pp 647\u2013657"},{"key":"127_CR10_127","series-title":"Lecture notes in computer science","first-page":"18","volume-title":"Public Key Cryptography 2003 (PKC \u201903)","author":"JC Cha","year":"2003","unstructured":"Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography 2003 (PKC \u201903). Lecture notes in computer science, vol 2567. Springer, Heidelberg, pp 18\u201330"},{"key":"127_CR11_127","volume-title":"Identity-based identification and signature schemes using correcting codes","author":"PL Cayrel","year":"2007","unstructured":"Cayrel PL, Gaborit P, Girault M (2007) Identity-based identification and signature schemes using correcting codes. In: Workshop of cryptography and coding 2007, Versailles"},{"key":"127_CR12_127","volume-title":"Computing Research Repository (CoRR) abs\/0903.0069","author":"PL Cayrel","year":"2009","unstructured":"Cayrel PL, Gaborit P, Galindo D, Girault M (2009) Improved identity-based identification using correcting codes. In: Computing Research Repository (CoRR) abs\/0903.0069"},{"key":"127_CR13_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"An identity based encryption scheme based on quadratic residues","author":"C Cocks","year":"2001","unstructured":"Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Proceedings of cryptography and coding. Lecture notes in computer science, vol 2260. Springer, Heidelberg, pp 360\u2013363"},{"key":"127_CR14_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/3-540-36288-6_10","volume-title":"Public key cryptography 2003 (PKC \u201903)","author":"Y Dodis","year":"2003","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature schemes. In: Public key cryptography 2003 (PKC \u201903). Lecture notes in computer science, vol 2567. Springer, Heidelberg, pp 130\u2013144"},{"key":"127_CR15_127","series-title":"Lecture notes in computer science","first-page":"186","volume-title":"Advances in cryptology \u2013 Crypto \u201986","author":"A Fiat","year":"1986","unstructured":"Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems. In: Advances in cryptology \u2013 Crypto \u201986. Lecture notes in computer science, vol 263. Springer, Heidelberg, pp 186\u2013194"},{"key":"127_CR16_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in cryptology \u2013 Crypto \u201999","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology \u2013 Crypto \u201999. Lecture notes in computer science, vol 1666. Springer, Heidelberg, pp 537\u2013554"},{"key":"127_CR17_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/3-540-45760-7_8","volume-title":"RSA conference cryptographers\u2019 track (CT-RSA \u201902)","author":"M Fischlin","year":"2002","unstructured":"Fischlin M, Fischlin R (2002) The representation problem based on factoring. In: RSA conference cryptographers\u2019 track (CT-RSA \u201902). Lecture notes in computer science, vol 2271. Springer, Heidelberg, pp 96\u2013113"},{"key":"127_CR18_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/11935230_12","volume-title":"Avances in cryptology \u2013 Asiacrypt \u201906","author":"D Galindo","year":"2006","unstructured":"Galindo D, Herranz J, Kiltz E (2006) On the generic construction of identity-based signatures with additional properties, In: Avances in cryptology \u2013 Asiacrypt \u201906. Lecture notes in computer science, vol 4284. Springer, Heidelberg, pp\u00a0178\u2013193"},{"key":"127_CR19_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-02384-2_9","volume-title":"Progress in cryptology \u2013 Africacrypt \u201909","author":"D Galindo","year":"2009","unstructured":"Galindo D, Garcia FD (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology \u2013 Africacrypt \u201909. Lecture notes in computer science, vol 5580. pp\u00a0135\u2013148"},{"key":"127_CR20_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public key cryptography 2006 (PKC \u201906)","author":"C Gentry","year":"2006","unstructured":"Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: Public key cryptography 2006 (PKC \u201906). Lecture notes in computer science, vol 3958. Springer, Heidelberg, pp 257\u2013273"},{"key":"127_CR21_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in cryptology \u2013 Asiacrypt \u201902","author":"C Gentry","year":"2002","unstructured":"Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Advances in cryptology \u2013 Asiacrypt \u201902. Lecture notes in computer science, vol 2501. Springer, Heidelberg, pp 548\u2013566"},{"issue":"2","key":"127_CR22_127","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1998","unstructured":"Goldwasser S, Micali S, Rivest R (1998) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281\u2013308","journal-title":"SIAM J Comput"},{"key":"127_CR23_127","series-title":"Lecture notes in computer science","first-page":"216","volume-title":"Advances in cryptology \u2013 Crypto \u201988","author":"L Guillou","year":"1998","unstructured":"Guillou L, Quisquater JJ (1998) A \u201cParadoxical\u201d identity-based signature scheme resulting from zero-knowledge. In: Advances in cryptology \u2013 Crypto \u201988. Lecture notes in computer science, vol 403. Springer, Heidelberg, pp 216\u2013231"},{"issue":"3","key":"127_CR24_127","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1093\/comjnl\/bxh153","volume":"49","author":"J Herranz","year":"2006","unstructured":"Herranz J (2006) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322\u2013330","journal-title":"Comput J"},{"key":"127_CR25_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/11523468_36","volume-title":"Append-only signatures","author":"E Kiltz","year":"2005","unstructured":"Kiltz E, Mityagin A, Panjwani S, Raghavan B (2005) Append-only signatures. In: International colloquium automata, languages and programming (ICALP \u201905). Lecture notes in computer science, vol 3580. Springer, Heidelberg, pp 434\u2013445"},{"key":"127_CR26_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Efficient identity based signature schemes based on pairings","author":"F Hess","year":"2003","unstructured":"Hess F (2003) Efficient identity based signature schemes based on pairings. In: Proceedings of SAC \u201902. Lecture notes in computer science, vol 2595. Springer, Heidelberg, pp 310\u2013324"},{"key":"127_CR27_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in cryptology \u2013 Eurocrypt \u201902","author":"J Horwitz","year":"2002","unstructured":"Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. In: Advances in cryptology \u2013 Eurocrypt \u201902. Lecture notes in computer science, vol 2332. Springer, Heidelberg, pp 466\u2013481"},{"key":"127_CR28_127","series-title":"Lecture notes in computer science","first-page":"31","volume-title":"Advances in cryptology \u2013 Crypto \u201992","author":"T Okamoto","year":"1992","unstructured":"Okamoto T (1992) Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in cryptology \u2013 Crypto \u201992. Lecture notes in computer science, vol 740. Springer, Heidelberg, pp 31\u201353"},{"key":"127_CR29_127","series-title":"Lecture notes in computer science","first-page":"432","volume-title":"Advances in cryptology \u2013 Eurocrypt \u201990","author":"H Ong","year":"1990","unstructured":"Ong H, Schnorr CP (1990) Fast signature generation with a fiat shamir-like scheme. In: Advances in cryptology \u2013 Eurocrypt \u201990. Lecture notes in computer science, vol 473. Springer, Heidelberg, pp 432\u2013440"},{"key":"127_CR30_127","doi-asserted-by":"crossref","unstructured":"Paterson KG (2002) ID-based signatures from pairings on elliptic curves. Available at \n                  http:\/\/eprint.iacr.org\/2002\/004\/","DOI":"10.1049\/el:20020682"},{"key":"127_CR31_127","series-title":"Lecture notes in computer science","first-page":"387","volume-title":"Efficient Identity-based signatures secure in the standard model","author":"KG Paterson","year":"2006","unstructured":"Paterson KG, Schuldt J (2006) Efficient Identity-based signatures secure in the standard model. In: 11th Australasian conference on information security and privacy (ACISP \u201906). Lecture notes in computer science, vol 4058. Springer, Heidelberg, pp 207\u2013222, 387\u2013398"},{"key":"127_CR32_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in cryptology \u2013 Eurocrypt \u201996","author":"D Pointcheval","year":"1996","unstructured":"Pointcheval D, Stern J (1996) Security proofs for signature schemes. In: Advances in cryptology \u2013 Eurocrypt \u201996. Lecture notes in computer science, vol 1070. Springer, Heidelberg, pp 387\u2013398"},{"issue":"3","key":"127_CR33_127","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396","journal-title":"J Cryptol"},{"key":"127_CR34_127","volume-title":"Cryptosystems based on pairing","author":"R Sakai","year":"2000","unstructured":"Sakai R, Ohgishi K, Kasahara M (2000) Cryptosystems based on pairing. In: The 2000 symposium on cryptography and information security, Okinawa, Japan"},{"key":"127_CR35_127","series-title":"Lecture notes in computer science","first-page":"239","volume-title":"Advances in cryptology \u2013 Crypto \u201989","author":"CP Schnorr","year":"1989","unstructured":"Schnorr CP (1989) Efficient identification and signatures for smart cards. In: Advances in cryptology \u2013 Crypto \u201989. Lecture notes in computer science, vol 435. Springer, Heidelberg, pp 239\u2013252"},{"key":"127_CR36_127","series-title":"Lecture notes in computer science","volume-title":"Advances in cryptology \u2013 Crypto \u201984","author":"A Shamir","year":"1984","unstructured":"Shamir A (1984) Identity based cryptosystems and signature schemes. In: Advances in cryptology \u2013 Crypto \u201984. Lecture notes in computer science, vol 196. Springer, Heidelberg"},{"key":"127_CR37_127","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in cryptology \u2013 Eurocrypt 2005","author":"B Waters","year":"2005","unstructured":"Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in cryptology \u2013 Eurocrypt 2005. Lecture notes in computer science, vol 2567. Springer, Heidelberg, pp 114\u2013127"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:42:49Z","timestamp":1591058569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_127","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}