{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:39:12Z","timestamp":1743007152249,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031455124"},{"type":"electronic","value":"9783031455131"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45513-1_9","type":"book-chapter","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T22:01:53Z","timestamp":1696975313000},"page":"157-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Certificateless Aggregate Signature Scheme with\u00a0Better Security"],"prefix":"10.1007","author":[{"given":"Ran","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yanwei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"issue":"6","key":"9_CR3","first-page":"2093","volume":"26","author":"Yu Zheng Gong","year":"2010","unstructured":"Zheng Gong, Yu., Long, X.H., Chen, K.: Practical certificateless aggregate signatures from bilinear maps. J. Inf. Sci. Eng. 26(6), 2093\u20132106 (2010)","journal-title":"J. Inf. Sci. Eng."},{"issue":"2","key":"9_CR4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.5755\/j01.itc.44.2.7625","volume":"44","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Zhang, Y., Li, Y., Wang, C.: Strong designated verifier signature scheme resisting replay attack. Inform. Technol. Control 44(2), 165\u2013171 (2015)","journal-title":"Inform. Technol. Control"},{"issue":"6","key":"9_CR5","doi-asserted-by":"publisher","first-page":"3076","DOI":"10.1007\/s11227-018-2312-y","volume":"75","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Kumari, S., Sharma, V., Li, X., Sangaiah, A.K., Islam, S.K.H.: Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6), 3076\u20133098 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2312-y","journal-title":"J. Supercomput."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumari, S., Sharma, V., Sangaiah, A.K., Wei, J., Li, X.: A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput.: Inform. Syst. 18, 80\u201389 (2018)","DOI":"10.1016\/j.suscom.2017.09.002"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Wu, L., Xu, Z., He, D., Wang, X.: New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Security Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/2595273"},{"key":"9_CR8","first-page":"184","volume":"44","author":"IA Kamil","year":"2019","unstructured":"Kamil, I.A., Ogundoyin, S.O.: An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. J. Inform. Secur. Appl. 44, 184\u2013200 (2019)","journal-title":"J. Inform. Secur. Appl."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Hou, Y., Wang, L., Kumari, S., Khan, M.K., Xiong, H.: An efficient certificateless aggregate signature scheme for the internet of vehicles. Trans. Emerg. Telecommun. Technol. 31(5), e3708 (2020)","DOI":"10.1002\/ett.3708"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Gayathri, N.B., Thumbur, G., Kumar, P.R., Rahman, M.Z.U., Reddy, P.V.: Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J. 6(5), 9064\u20139075 (2019)","DOI":"10.1109\/JIOT.2019.2927089"},{"issue":"6","key":"9_CR11","doi-asserted-by":"publisher","first-page":"5256","DOI":"10.1109\/JIOT.2020.2979613","volume":"7","author":"J Liu","year":"2020","unstructured":"Liu, J., Wang, L., Yong, Yu.: Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 7(6), 5256\u20135266 (2020)","journal-title":"IEEE Internet Things J."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Gong, Z., Gao, T., Guo, N.: Pcas: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for vanets. Ad Hoc Networks, p. 103134 (2023)","DOI":"10.1016\/j.adhoc.2023.103134"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Yang, X., Wen, H., Diao, R., Du, X., Wang, C.: Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet of Things Journal (2023)","DOI":"10.1109\/JIOT.2023.3240426"},{"issue":"7","key":"9_CR14","doi-asserted-by":"publisher","first-page":"5973","DOI":"10.1109\/JIOT.2020.3033337","volume":"8","author":"Yu Zhan","year":"2021","unstructured":"Zhan, Yu., Wang, B., Rongxing, L.: Cryptanalysis and improvement of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 8(7), 5973\u20135984 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1842","DOI":"10.1109\/JSYST.2020.3046450","volume":"16","author":"Z Qiao","year":"2021","unstructured":"Qiao, Z., Yang, Q., Zhou, Y., Zhang, M.: Improved secure transaction scheme with certificateless cryptographic primitives for Iot-based mobile payments. IEEE Syst. J. 16(2), 1842\u20131850 (2021)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45513-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T17:20:22Z","timestamp":1703352022000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45513-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031455124","9783031455131"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45513-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2023.github.io\/ProvSec2023\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}