{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:11:38Z","timestamp":1742969498623,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591049"},{"type":"electronic","value":"9783319591056"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59105-6_55","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T07:45:06Z","timestamp":1494920706000},"page":"638-651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Hyla","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Peja\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"issue":"2","key":"55_CR1","first-page":"481","volume":"E85-A","author":"S Mitsunari","year":"2002","unstructured":"Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. E85-A(2), 481\u2013484 (2002)","journal-title":"A new traitor tracing. IEICE Trans."},{"key":"55_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11586821_29","volume-title":"Cryptography and Coding","author":"L Chen","year":"2005","unstructured":"Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara\u2019s identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 442\u2013459. Springer, Heidelberg (2005). doi:10.1007\/11586821_29"},{"key":"55_CR3","unstructured":"Sakai, R., Kasahara, M.: ID based Cryptosystems with Pairing on Elliptic Curve (2003). http:\/\/eprint.iacr.org\/2003\/054"},{"key":"55_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F Zhang","year":"2004","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277\u2013290. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24632-9_20"},{"key":"55_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"PSLM Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515\u2013532. Springer, Heidelberg (2005). doi:10.1007\/11593447_28"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10623-006-9022-9","volume":"42","author":"BC Hu","year":"2007","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptogr. 42, 109\u2013126 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Du, H., Wen, Q.: An efficient identity-based short signature scheme from bilinear pairings. In: 2007 International Conference on Computational Intelligence and Security (CIS 2007), pp. 725\u2013729 (2007)","DOI":"10.1109\/CIS.2007.168"},{"key":"55_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-40061-5_29"},{"key":"55_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"M Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490\u2013497. Springer, Heidelberg (1991). doi:10.1007\/3-540-46416-6_42"},{"issue":"2","key":"55_CR10","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.csi.2008.05.013","volume":"31","author":"H Du","year":"2009","unstructured":"Du, H., Wen, Q.: Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 31(2), 390\u2013394 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"55_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11599371_2","volume-title":"Cryptology and Network Security","author":"X Huang","year":"2005","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13\u201325. Springer, Heidelberg (2005). doi:10.1007\/11599371_2"},{"issue":"4","key":"55_CR12","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1093\/comjnl\/bxr097","volume":"55","author":"X Huang","year":"2011","unstructured":"Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Comput. J. 55(4), 457\u2013474 (2011)","journal-title":"Comput. J."},{"key":"55_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-540-24660-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"BG Kang","year":"2004","unstructured":"Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99\u2013111. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24660-2_8"},{"key":"55_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-73408-6_8","volume-title":"Public Key Infrastructure","author":"J Li","year":"2007","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110\u2013125. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73408-6_8"},{"issue":"3","key":"55_CR15","first-page":"243","volume":"45","author":"Y-H Hung","year":"2015","unstructured":"Hung, Y.-H., Huang, S.-S., Tseng, Y.-M.: A short certificate-based signature scheme with provable security. Inf. Technol. Control 45(3), 243\u2013253 (2015)","journal-title":"Inf. Technol. Control"},{"issue":"8","key":"55_CR16","first-page":"1659","volume":"15","author":"W Wu","year":"2009","unstructured":"Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures revisited. J. Univ. Comput. Sci. 15(8), 1659\u20131684 (2009)","journal-title":"J. Univ. Comput. Sci."},{"key":"55_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-23041-7_17","volume-title":"NETWORKING 2011 Workshops","author":"JK Liu","year":"2011","unstructured":"Liu, J.K., Bao, F., Zhou, J.: Short and efficient certificate-based signature. In: Casares-Giner, V., Manzoni, P., Pont, A. (eds.) NETWORKING 2011. LNCS, vol. 6827, pp. 167\u2013178. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23041-7_17"},{"key":"55_CR18","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1016\/j.proeng.2012.01.397","volume":"29","author":"L Cheng","year":"2012","unstructured":"Cheng, L., Xiao, Y., Wang, G.: Cryptanalysis of a certificate-based on signature scheme. Procedia Eng. 29, 2821\u20132825 (2012)","journal-title":"Procedia Eng."},{"key":"55_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-3-662-45237-0_59","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2014","unstructured":"Hyla, T., Ma\u0107k\u00f3w, W., Peja\u015b, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651\u2013666. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-45237-0_59"},{"key":"55_CR20","doi-asserted-by":"publisher","unstructured":"Hyla, T., Peja\u015b, J.: A hess-like signature scheme based on implicit and explicit certificates. Comput. J. 60(4), 457\u2013475 (2017). doi:10.1093\/comjnl\/bxw052, http:\/\/comjnl.oxfordjournals.org\/cgi\/reprint\/bxw052","DOI":"10.1093\/comjnl\/bxw052"},{"key":"55_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-48429-7_16","volume-title":"Hard and Soft Computing for Artificial Intelligence, Multimedia and Security","author":"T Hyla","year":"2017","unstructured":"Hyla, T., Peja\u015b, J.: Non-standard certification models for pairing based cryptography. In: Kobayashi, S.-Y., Piegat, A., Peja\u015b, J., El Fray, I., Kacprzyk, J. (eds.) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. AISC, vol. 534, pp. 167\u2013181. Springer, Cham (2017). doi:10.1007\/978-3-319-48429-7_16"},{"issue":"2","key":"55_CR22","first-page":"109","volume":"24","author":"SH Islam","year":"2012","unstructured":"Islam, S.H., Biswas, G.P.: An efficient and provably-secure digital signature scheme based on elliptic curve bilinear pairings. Theor. Appl. Inf. 24(2), 109\u2013118 (2012)","journal-title":"Theor. Appl. Inf."},{"issue":"1","key":"55_CR23","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00145-010-9082-x","volume":"25","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57\u2013115 (2012)","journal-title":"J. Cryptology"},{"key":"55_CR24","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.jss.2011.08.014","volume":"85","author":"J Li","year":"2012","unstructured":"Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Soft. 85, 314\u2013322 (2012)","journal-title":"J. Syst. Soft."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59105-6_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T00:09:02Z","timestamp":1621123742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59105-6_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591049","9783319591056"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59105-6_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bialystok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wi.pb.edu.pl\/cisim2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}