{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:13Z","timestamp":1749787813058,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_28","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"489-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Generic Construction of Certificateless Signcryption Scheme"],"prefix":"10.1007","author":[{"given":"Jayaprakash","family":"Kar","sequence":"first","affiliation":[]},{"given":"Kshirasagar","family":"Naik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology \u2013 CRYPTO 1997","author":"Y Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) $$\\ll $$ cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) Advances in Cryptology \u2013 CRYPTO 1997. LNCS, vol. 1294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 1984","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems, signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology: Proceedings of CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology \u2013 CRYPTO 1986: Proceedings","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) Advances in Cryptology \u2013 CRYPTO 1986: Proceedings. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 1988: Proceedings","author":"LC Guillou","year":"1990","unstructured":"Guillou, L.C., Quisquater, J.-J.: A \u201cparadoxical\u201d indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) Advances in Cryptology \u2013 CRYPTO 1988: Proceedings. LNCS, vol. 403, pp. 216\u2013231. Springer, Heidelberg (1990)"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"PSLM Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515\u2013532. Springer, Heidelberg (2005). doi: 10.1007\/11593447_28"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity-based signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383\u2013399. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_23"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography - PKC 2005","author":"L Chen","year":"2005","unstructured":"Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362\u2013379. Springer, Heidelberg (2005)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_26","volume-title":"Information Security and Cryptology - ICISC 2003","author":"SSM Chow","year":"2004","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352\u2013369. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24691-6_26"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquater, J.J.: A new identity based signcryption schemes from pairings. In: IEEE Information Theory Workshop, Paris, France, pp. 155\u2013158 (2003)","DOI":"10.1109\/ITW.2003.1216718"},{"key":"28_CR10","unstructured":"Malone-Lee, J.: Identity based signcryption, Cryptology ePrint Archive, Report 2002\/098"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-642-12827-1_22","volume-title":"Information Security, Practice and Experience","author":"SSD Selvi","year":"2010","unstructured":"Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Certificateless KEM and hybrid signcryption schemes revisited. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 294\u2013307. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12827-1_22"},{"key":"28_CR13","unstructured":"Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing, Cryptology ePrint Archive: Report 2009\/298. http:\/\/eprint.iacr.org\/2009\/298.pdf"},{"key":"28_CR14","unstructured":"Xie, W., Zhang, Z.: Certificateless signcryption without pairing. Cryptology ePrint Archive: Report 2010\/187. http:\/\/eprint.iacr.org\/2010\/187.pdf"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11556992_10","volume-title":"Information Security","author":"J Baek","year":"2005","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134\u2013148. Springer, Heidelberg (2005). doi: 10.1007\/11556992_10"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-36563-X_14","volume-title":"Topics in Cryptology \u2014 CT-RSA 2003","author":"J Malone-Lee","year":"2003","unstructured":"Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211\u2013226. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36563-X_14"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/11745853_31","volume-title":"Public Key Cryptography - PKC 2006","author":"B Libert","year":"2006","unstructured":"Libert, B., Quisquater, J.-J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474\u2013490. Springer, Heidelberg (2006). doi: 10.1007\/11745853_31"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Barbosa, M., Farshim, P.: Certificateless signcryption. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), Tokyo, Japan, pp. 369\u2013372 (2008)","DOI":"10.1145\/1368310.1368364"},{"key":"28_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"28_CR20","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","volume":"180","author":"Z Liu","year":"2010","unstructured":"Liu, Z., Yupu, H., Zhang, X., Ma, H.: Certificateless signcryption scheme in the standard model. Inf. Sci. 180, 452\u2013464 (2010)","journal-title":"Inf. Sci."},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Xie, W., Zhang, Z.: Efficient and provably secure certificateless signcryption from bilinear maps. eprint.iacr.org\/2009\/578","DOI":"10.1109\/WCINS.2010.5541841"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-00843-6_11","volume-title":"Information Security Practice and Experience","author":"F Li","year":"2009","unstructured":"Li, F., Shirase, M., Takagi, T.: Certificateless hybrid signcryption. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 112\u2013123. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00843-6_11"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:41:54Z","timestamp":1749760914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}