{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:18Z","timestamp":1726037718002},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_4","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"35-45","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Security Analysis of Certificateless Aggregate Signature Scheme"],"prefix":"10.1007","author":[{"given":"Li","family":"Cui","sequence":"first","affiliation":[]},{"given":"Yang","family":"Heng","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Gang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"4_CR1","unstructured":"Wang, M.J., Wang, J., Guo, L.H., et al.: Inverted XML access control model based on ontology semantic dependency. CMC: Comput. Mater. Continua 55(3), 465\u2013482 (2018)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, Chi-Sung (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29"},{"key":"4_CR4","unstructured":"Cui, J.H., Zhang, Y.Y., Cai, Z.P., et al.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Continua 55(1), 017\u2013035 (2018)"},{"issue":"5","key":"4_CR5","first-page":"313","volume":"43","author":"LM Zuo","year":"2017","unstructured":"Zuo, L.M., Zhang, T.T., Guo, H.L., et al.: Certificateless aggregate signature scheme based on no pairing mapping. Comput. Eng. 43(5), 313\u2013316 (2017)","journal-title":"Comput. Eng."},{"issue":"1","key":"4_CR6","first-page":"11","volume":"40","author":"DX Wang","year":"2018","unstructured":"Wang, D.X., Teng, J.K.: Probably secure certificateless aggregate signature algorithm for vehicular ad hoc network. J. Electronica Inf. Technol. 40(1), 11\u201317 (2018)","journal-title":"J. Electronica Inf. Technol."},{"issue":"1","key":"4_CR7","first-page":"72","volume":"40","author":"HZ Du","year":"2013","unstructured":"Du, H.Z., Huang, M.J., Wen, Q.Y.: Efficient and provably-secure certificateless aggregate signature scheme. Acta Electronica Sinica 40(1), 72\u201376 (2013)","journal-title":"Acta Electronica Sinica"},{"key":"4_CR8","unstructured":"Zhang, Y.L., Li, C.Y., Wang, C.F., et al.: Security analysis and improvements of certificateless aggregate signature schemes. J. Electron. Inf. Technol. 37(8), 1994\u20131999 (2015)"},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"3076","DOI":"10.1007\/s11227-018-2312-y","volume":"75","author":"Pankaj Kumar","year":"2018","unstructured":"Pankaj, K., Saru, K., Vishnu, S., et al.: Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. (2018). https:\/\/doi.org\/10.1007\/s11227-018-2312-y","journal-title":"The Journal of Supercomputing"},{"issue":"8","key":"4_CR10","first-page":"1845","volume":"44","author":"Y Xu","year":"2016","unstructured":"Xu, Y., Huang, L.S., Tian, M.M., et al.: A provably secure and compact certificateless aggregate signature scheme. Acta Electronica Sinica 44(8), 1845\u20131850 (2016)","journal-title":"Acta Electronica Sinica"},{"issue":"1","key":"4_CR11","first-page":"77","volume":"56","author":"HZ Du","year":"2017","unstructured":"Du, H.Z., Wen, Q.Y.: Attack and improvement of a certificateless aggregate signature scheme. Acta Scientiarum Naturalium Univ. Sunyatseni 56(1), 77\u201384 (2017)","journal-title":"Acta Scientiarum Naturalium Univ. Sunyatseni"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Au, M.H., Mu, Y., Chen, J., et al.: Malicious KGC attack in certificateless cryptography. In: Proceedings of the ASIACCS 2007, New York, USA, pp. 302\u2013311 (2007)","DOI":"10.1145\/1229285.1266997"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.ins.2013.09.032","volume":"268","author":"DB He","year":"2014","unstructured":"He, D.B., Tian, M.M., Chen, J.H.: Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268, 458\u2013462 (2014)","journal-title":"Inf. Sci."},{"issue":"9","key":"4_CR14","first-page":"29","volume":"50","author":"AW Fan","year":"2015","unstructured":"Fan, A.W., Xia, D.L., Yang, Z.F.: Security analysis and improvement of two certificateless aggregate signature schemes. J. Shandong Univ. (Nat. Sci.) 50(9), 29\u201334 (2015)","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"issue":"2","key":"4_CR15","first-page":"331","volume":"36","author":"YL Zhang","year":"2015","unstructured":"Zhang, Y.L., Zhou, D.R., Li, C.Y., et al.: Certificateless-based efficient aggregate signature scheme with universal designated verifier. J. Commun. 36(2), 331\u2013338 (2015)","journal-title":"J. Commun."},{"issue":"12","key":"4_CR16","first-page":"3204","volume":"26","author":"YW Zhou","year":"2015","unstructured":"Zhou, Y.W., Yang, B., Zhang, W.Z.: Efficient and provide security certificateless aggregate signature scheme. J. Softw. 26(12), 3204\u20133214 (2015)","journal-title":"J. Softw."},{"issue":"5","key":"4_CR17","first-page":"1173","volume":"26","author":"H Chen","year":"2015","unstructured":"Chen, H., Wei, S.M., Zhu, C.J., et al.: Secure certificateless aggregate signature scheme. J. Softw. 26(5), 1173\u20131180 (2015)","journal-title":"J. Softw."},{"issue":"10","key":"4_CR18","first-page":"80","volume":"52","author":"JH Hu","year":"2016","unstructured":"Hu, J.H., Du, H.Z., Zhang, J.Z.: Analysis and improvement of certificateless aggregate signature scheme. Comput. Eng. Appl. 52(10), 80\u201384 (2016)","journal-title":"Comput. Eng. Appl."},{"issue":"8","key":"4_CR19","first-page":"307","volume":"34","author":"YJ Zhang","year":"2017","unstructured":"Zhang, Y.J., Zhang, Y.L., Wang, C.F.: Security analysis and improvement of aggregate signature schemes. Comput. Appl. Softw. 34(8), 307\u2013311 (2017)","journal-title":"Comput. Appl. Softw."},{"issue":"1","key":"4_CR20","first-page":"411","volume":"8","author":"H Liu","year":"2014","unstructured":"Liu, H., Wang, S.J., Liang, M.G., et al.: New construction of efficient certificateless aggregate signatures. J. Secur. Appl. 8(1), 411\u2013422 (2014)","journal-title":"J. Secur. Appl."},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(2), 213\u2013241 (2007)","journal-title":"Int. J. Inf. Secur."},{"issue":"6","key":"4_CR22","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao, X., Kou, W.: A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Inf. Sci. 180(6), 2895\u20132903 (2010)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T03:25:44Z","timestamp":1663989944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}