{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:33:25Z","timestamp":1768070005556,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540406747","type":"print"},{"value":"9783540451464","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_23","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T17:51:19Z","timestamp":1277229079000},"page":"383-399","source":"Crossref","is-referenced-by-count":208,"title":["Multipurpose Identity-Based Signcryption"],"prefix":"10.1007","author":[{"given":"Xavier","family":"Boyen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.H. An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, p. 83. Springer, Heidelberg (2002)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 354. Springer, Heidelberg (2002)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. Conf. Computer and Communication Security (1993)","DOI":"10.1145\/168588.168596"},{"key":"23_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001), See [6] for the full version."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Cryptology ePrint Archive, Report 2001\/090 (2001), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/3-540-44647-8_13"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"23_CR8","unstructured":"Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. Cryptology ePrint Archive, Report 2002\/018 (2002), http:\/\/eprint.iacr.org\/"},{"key":"23_CR9","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002\/184 (2002), http:\/\/eprint.iacr.org\/"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Proc. 8th IMA Int. Conf. Cryptography and Coding, pp. 26\u201328 (2001)","DOI":"10.1007\/3-540-45325-3_32"},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM J. Computing"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptology\u00a01, 77\u201394 (1988)","journal-title":"J. Cryptology"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. Technical Report HPL-2002-23, HP Laboratories Bristol (2002)","DOI":"10.1007\/3-540-45455-1_26"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. Cryptology ePrint Archive, Report 2002\/056 (2002), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/3-540-36178-2_34"},{"key":"23_CR16","unstructured":"Hess, F.: Exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002\/012 (2002), http:\/\/eprint.iacr.org\/"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Horwitz","year":"2002","unstructured":"Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 466\u2013481. Springer, Heidelberg (2002)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 294\u2013385. Springer, Heidelberg (2000)"},{"key":"23_CR19","unstructured":"Libert, B., Quisquater, J.-J.: New identity based signcryption schemes based on pairings. Cryptology ePrint Archive, Report 2003\/023 (2003), http:\/\/eprint.iacr.org\/"},{"key":"23_CR20","unstructured":"Lynn, B.: Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002\/072 (2002), http:\/\/eprint.iacr.org\/"},{"key":"23_CR21","unstructured":"Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive, Report 2002\/098 (2002), http:\/\/eprint.iacr.org\/"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002\/004 (2002), http:\/\/eprint.iacr.org\/","DOI":"10.1049\/el:20020682"},{"key":"23_CR23","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairings. In: Proc. SCIS 2000, Okinawa, Japan, pp. 26\u201328 (2000)"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"23_CR25","unstructured":"Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Cryptology ePrint Archive, Report 2001\/111 (2001), http:\/\/eprint.iacr.org\/"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology\u00a013, 361\u2013396 (2000)","journal-title":"J. Cryptology"},{"key":"23_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) <\u2009< cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:51:57Z","timestamp":1559195517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}