{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:33:28Z","timestamp":1743136408846,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030783716"},{"type":"electronic","value":"9783030783723"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78372-3_12","type":"book-chapter","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T19:04:11Z","timestamp":1623179051000},"page":"313-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Certificate-Based Signature Scheme in the Standard Model"],"prefix":"10.1007","author":[{"given":"Guoqiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yanmei","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,9]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29"},{"key":"12_CR2","volume-title":"Public Key Cryptography. Applications and Attacks","author":"LM Batten","year":"2016","unstructured":"Batten, L.M.: Public Key Cryptography. Applications and Attacks. Wiley-Blackwell, Hoboken (2016)"},{"issue":"13","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1016\/j.dam.2011.04.021","volume":"159","author":"S Chatterjee","year":"2011","unstructured":"Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of $$ \\psi $$ revisited. Discret. Appl. Math. 159(13), 1311\u20131322 (2011)","journal-title":"Discret. Appl. Math."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1016\/j.proeng.2012.01.397","volume":"29","author":"L Cheng","year":"2012","unstructured":"Cheng, L., Xiao, Y., Wang, G.: Cryptanalysis of a certificate-based on signature scheme. Procedia Eng. 29, 2821\u20132825 (2012)","journal-title":"Procedia Eng."},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/s00145-018-9281-4","volume":"32","author":"G Fuchsbauer","year":"2019","unstructured":"Fuchsbauer, G., Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. J. Cryptol. 32(2), 498\u2013546 (2019)","journal-title":"J. Cryptol."},{"issue":"16","key":"12_CR6","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"SD Galbraith","year":"2008","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113\u20133121 (2008)","journal-title":"Discret. Appl. Math."},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"C Gentry","year":"2003","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272\u2013293. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_17"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70972-7_26","volume-title":"Financial Cryptography and Data Security","author":"E Ghadafi","year":"2017","unstructured":"Ghadafi, E.: Efficient round-optimal blind signatures in the standard model. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 455\u2013473. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_26"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-66399-9_3","volume-title":"Computer Security \u2013 ESORICS 2017","author":"E Ghadafi","year":"2017","unstructured":"Ghadafi, E.: More efficient structure-preserving signatures - or: bypassing the type-III lower bounds. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 43\u201361. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_3"},{"issue":"1","key":"12_CR10","first-page":"209","volume":"22","author":"R Huang","year":"2021","unstructured":"Huang, R., Huang, Z., Chen, Q.: A generic conversion from proxy signatures to certificate-based signatures. J. Internet Technol. 22(1), 209\u2013217 (2021)","journal-title":"J. Internet Technol."},{"issue":"3","key":"12_CR11","first-page":"243","volume":"45","author":"Y Hung","year":"2016","unstructured":"Hung, Y., Huang, S., Tsen, Y.: A short certificate-based signature scheme with provable security. Inf. Technol. Control. 45(3), 243\u2013253 (2016)","journal-title":"Inf. Technol. Control."},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-540-24660-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"BG Kang","year":"2004","unstructured":"Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99\u2013111. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24660-2_8"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Kumar, P., Sharma, V.: Insecurity of a secure certificate-based signature scheme. In: ICACCCN 2018, pp. 371\u2013373. IEEE (2018). https:\/\/doi.org\/10.1109\/ICACCCN.2018.8748312","DOI":"10.1109\/ICACCCN.2018.8748312"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-73408-6_8","volume-title":"Public Key Infrastructure","author":"J Li","year":"2007","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110\u2013125. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73408-6_8"},{"issue":"3","key":"12_CR15","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3233\/JCS-2009-0366","volume":"18","author":"J Li","year":"2010","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421\u2013449 (2010)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"12_CR16","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.jss.2011.08.014","volume":"85","author":"J Li","year":"2012","unstructured":"Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314\u2013322 (2012)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"12_CR17","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1109\/TII.2019.2898900","volume":"15","author":"D Liu","year":"2019","unstructured":"Liu, D., Alahmadi, A., Ni, J., Lin, X., Shen, X.: Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Trans. Ind. Inform. 15(6), 3527\u20133537 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-540-85886-7_20","volume-title":"Information Security","author":"JK Liu","year":"2008","unstructured":"Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285\u2013297. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85886-7_20"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-23041-7_17","volume-title":"NETWORKING 2011 Workshops","author":"JK Liu","year":"2011","unstructured":"Liu, J.K., Bao, F., Zhou, J.: Short and efficient certificate-based signature. In: Casares-Giner, V., Manzoni, P., Pont, A. (eds.) NETWORKING 2011. LNCS, vol. 6827, pp. 167\u2013178. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23041-7_17"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1049\/iet-ifs.2015.0188","volume":"10","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, J.: Improved certificate-based signature scheme without random oracles. Inf. Secur. 10(2), 80\u201386 (2016)","journal-title":"Inf. Secur."},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-319-72359-4_23","volume-title":"Information Security Practice and Experience","author":"X Ma","year":"2017","unstructured":"Ma, X., Shao, J., Zuo, C., Meng, R.: Efficient certificate-based signature and its aggregation. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 391\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72359-4_23"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Ni, J., Lin, X., Zhang, K., Shen, X.: Privacy-preserving real-time navigation system using vehicular crowdsourcing. In: VTC Fall 2016, pp. 1\u20135. IEEE (2016). https:\/\/doi.org\/10.1109\/VTCFall.2016.7881177","DOI":"10.1109\/VTCFall.2016.7881177"},{"issue":"7","key":"12_CR23","first-page":"6504","volume":"67","author":"J Ni","year":"2018","unstructured":"Ni, J., Zhang, K., Yu, Y., Lin, X., Shen, X.S.: Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval. IEEE Trans. Veh. Technol. 67(7), 6504\u20136517 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-29485-8_7","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"D Pointcheval","year":"2016","unstructured":"Pointcheval, D., Sanders, O.: Short randomizable signatures. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 111\u2013126. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29485-8_7"},{"issue":"4","key":"12_CR25","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1145\/322217.322225","volume":"27","author":"JT Schwartz","year":"1980","unstructured":"Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701\u2013717 (1980)","journal-title":"J. ACM"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"5","key":"12_CR27","first-page":"1159","volume":"18","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Ren, Y., He, D.: Efficient certificate-based signature scheme for electronic commerce security using bilinear pairing. J. Internet Technol. 18(5), 1159\u20131166 (2017)","journal-title":"J. Internet Technol."},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-00306-6_8","volume-title":"Information Security Applications","author":"W Wu","year":"2009","unstructured":"Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures: new definitions and a generic construction from certificateless signatures. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 99\u2013114. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00306-6_8"},{"issue":"5","key":"12_CR29","doi-asserted-by":"publisher","first-page":"3290","DOI":"10.1109\/TII.2019.2944678","volume":"16","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Zhao, Y., Li, Y., Du, X., Wang, L., Guizani, M.: Blockchain-based anonymous authentication with selective revocation for smart industrial applications. IEEE Trans. Ind. Inform. 16(5), 3290\u20133300 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-00843-6_5","volume-title":"Information Security Practice and Experience","author":"J Zhang","year":"2009","unstructured":"Zhang, J.: On the security of a certificate-based signature scheme and its improvement with pairings. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 47\u201358. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00843-6_5"},{"issue":"4","key":"12_CR31","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1049\/cje.2015.10.019","volume":"24","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Li, J., Wang, Z., Yao, W.: A new efficient certificate-based signature scheme. Chin. J. Electron. 24(4), 776\u2013782 (2015)","journal-title":"Chin. J. Electron."},{"issue":"5","key":"12_CR32","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/iet-ifs.2016.0261","volume":"11","author":"C Zhou","year":"2017","unstructured":"Zhou, C., Cui, Z.: Certificate-based signature scheme in the standard model. Inf. Secur. 11(5), 256\u2013260 (2017)","journal-title":"Inf. Secur."},{"issue":"4","key":"12_CR33","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TDSC.2018.2850780","volume":"17","author":"L Zhu","year":"2020","unstructured":"Zhu, L., Li, M., Zhang, Z., Qin, Z.: ASAP: an anonymous smart-parking and payment scheme in vehicular networks. IEEE Trans. Dependable Secur. Comput. 17(4), 703\u2013715 (2020)","journal-title":"IEEE Trans. Dependable Secur. Comput."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78372-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:29:39Z","timestamp":1709821779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78372-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030783716","9783030783723"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78372-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kamakura","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.89","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7.81","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference took place virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}