{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T22:10:03Z","timestamp":1749766203879,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504711"},{"type":"electronic","value":"9783319504728"}],"license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50472-8_16","type":"book-chapter","created":{"date-parts":[[2016,11,25]],"date-time":"2016-11-25T16:17:15Z","timestamp":1480090635000},"page":"196-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Preserving Signcryption Scheme"],"prefix":"10.1007","author":[{"given":"Payal","family":"Chaudhari","sequence":"first","affiliation":[]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456\u2013465 (2007)","DOI":"10.1145\/1315245.1315302"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-540-70583-3_47","volume-title":"Automata, Languages and Programming","author":"V Goyal","year":"2008","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579\u2013591. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70583-3_47"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13190-5_4"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"T Okamoto","year":"2010","unstructured":"Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_11"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 195\u2013203 (2007)","DOI":"10.1145\/1315245.1315270"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19379-8_4"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-19379-8_5","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"S Yamada","year":"2011","unstructured":"Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 71\u201389. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19379-8_5"},{"key":"16_CR10","unstructured":"Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: Proceedings of Network and Distributed System Security Symposium, vol. 7, pp. 179\u2013192 (2007)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proceedings of Workshop on Secure Network Protocols, pp. 39\u201344. IEEE (2008)","DOI":"10.1109\/NPSEC.2008.4664879"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"T Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111\u2013129. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68914-0_7"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-04474-8_28","volume-title":"Information Security","author":"J Li","year":"2009","unstructured":"Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347\u2013362. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04474-8_28"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511\u2013516 (2013)","DOI":"10.1145\/2484313.2484381"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-26961-0_23","volume-title":"Information Systems Security","author":"P Chaudhari","year":"2015","unstructured":"Chaudhari, P., Das, M.L., Mathuria, A.: On anonymous attribute based encryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 378\u2013392. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26961-0_23"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-45204-8_25","volume-title":"Information Systems Security","author":"YS Rao","year":"2013","unstructured":"Rao, Y.S., Dutta, R.: Recipient anonymous ciphertext-policy attribute based encryption. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 329\u2013344. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-45204-8_25"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO","author":"Y Zheng","year":"1997","unstructured":"Zheng, Y.: Digital Signatures or how to achievecost (Signature & Encryption)<< Cost (Signature) +Cost(Encryption). In: Kaliski, B.S. (ed.) Advances in Cryptology - CRYPTO. LNCS, vol. 1294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"16_CR18","unstructured":"Malone-Lee, J.: Identity-Based Signcryption. IACR Cryptology eprint Archieve, report 2002\/098 (2002)"},{"key":"16_CR19","unstructured":"Libert, B., Quisquater, J.J.: New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive, report 2003\/23 (2003)"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography - PKC 2005","author":"L Chen","year":"2005","unstructured":"Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362\u2013379. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-30580-4_25"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"PSLM Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515\u2013532. Springer, Heidelberg (2005). doi: 10.1007\/11593447_28"},{"key":"16_CR22","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-89411-7_10","volume-title":"Practical Signcryption","author":"X Boyen","year":"2010","unstructured":"Boyen, X.: Identity-based signcryption. In: Dent, A.W., Zheng, Y. (eds.) Practical Signcryption. Information Security and Cryptography, pp. 195\u2013216. Springer, Heidelberg (2010)"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/11780656_17","volume-title":"Information Security and Privacy","author":"S Duan","year":"2006","unstructured":"Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195\u2013206. Springer, Heidelberg (2006). doi: 10.1007\/11780656_17"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-642-25255-6_62","volume-title":"Information Computing and Applications","author":"Y Ming","year":"2011","unstructured":"Ming, Y., Zhao, X., Wang, Y.: Multi-receiver identity-based signcryption scheme in the standard model. In: Liu, B., Chai, C. (eds.) ICICA 2011. LNCS, vol. 7030, pp. 487\u2013494. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25255-6_62"},{"issue":"3","key":"16_CR25","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1049\/iet-ifs.2014.0360","volume":"9","author":"L Pang","year":"2015","unstructured":"Pang, L., Gao, L., Li, H., Wang, Y.: Anonymous multi-receiver ID-based signcryption scheme. Inf. Secur. IET 9(3), 194\u2013201 (2015)","journal-title":"Inf. Secur. IET"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C., Huang, J.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: Proceedings of the International Conference on Computational Intelligence and Security, pp. 905\u2013909. IEEE (2011)","DOI":"10.1109\/CIS.2011.204"},{"key":"16_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-15317-4_11","volume-title":"Security and Cryptography for Networks","author":"M Gagn\u00e9","year":"2010","unstructured":"Gagn\u00e9, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 154\u2013171. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15317-4_11"},{"issue":"3","key":"16_CR28","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJACT.2012.045589","volume":"2","author":"K Emura","year":"2012","unstructured":"Emura, K., Miyaji, A., Rahman, M.S.: Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Cryptogr. 2(3), 199\u2013211 (2012)","journal-title":"Int. J. Appl. Cryptogr."}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50472-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T21:39:30Z","timestamp":1749764370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50472-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"ISBN":["9783319504711","9783319504728"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50472-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,11,26]]},"assertion":[{"value":"26 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Internet Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 January 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icdcit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}