{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:41:09Z","timestamp":1725489669769},"publisher-location":"Berlin, Heidelberg","reference-count":82,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748090"},{"type":"electronic","value":"9783540748106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74810-6_7","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T05:44:24Z","timestamp":1187329464000},"page":"183-208","source":"Crossref","is-referenced-by-count":17,"title":["An Interpretation of Identity-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Liqun","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S., Paterson, K.: Certifficateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/978-3-540-30580-4_27","volume-title":"Public Key Cryptography - PKC 2005","author":"S. Al-Riyami","year":"2005","unstructured":"Al-Riyami, S., Paterson, K.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 398\u2013415. Springer, Heidelberg (2005)"},{"key":"7_CR3","unstructured":"Au, M., Liu, J., Yuen, T., Wong, D.: Practical hierarchical identity based encryption and signature schemes without random oracles. Cryptology ePrint Archive, Report 2006\/368"},{"key":"7_CR4","unstructured":"Barbosa, M., Chen, L., Cheng, Z., Chimley, M., Dent, A., Farshim, P., Harrison, K., Malone-Lee, J., Smart, N.P., Vercauteren, F.: SK-KEM: an identity-based KEM. Submitted to IEEE P 1363.3, available at \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/submissions\/index.html"},{"key":"7_CR5","unstructured":"Barreto, P.: The pairing-based crypto lounge, \n                    \n                      http:\/\/paginas.terra.com.br\/informatica\/paulobarreto\/pblounge.html"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P. Barreto","year":"2005","unstructured":"Barreto, P., Libert, B., McCullagh, N., Quisquater, J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 515\u2013532. Springer, Heidelberg (2005)"},{"key":"7_CR7","unstructured":"Barreto, P., Libert, B., McCullagh, N., Quisquater, J.: Efficient and secure identity-based signatures and signcryption from bilinear maps. IEEE P.3 1363 available at \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/submissions\/index.html\n                    \n                    \n                   (submitted)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proceedings of the First Annual Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the First Annual Conference on Computer and Communications Security, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"7_CR12","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005\/058"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Cryptography and Coding","author":"S. Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol.\u00a01355, pp. 30\u201345. Springer, Heidelberg (1997)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-540-28628-8_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Secure identity-based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 443\u2013459. Springer, Heidelberg (2004)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/978-3-540-24852-1_18","volume-title":"Applied Cryptography and Network Security","author":"C. Boyd","year":"2004","unstructured":"Boyd, C., Mao, W., Paterson, K.: Key agreement using statically keyed authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 248\u2013262. Springer, Heidelberg (2004)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","first-page":"382","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 382\u2013398. Springer, Heidelberg (2003)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"X. Boyen","year":"2006","unstructured":"Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, Springer, Heidelberg (2006)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","first-page":"18","volume-title":"Public Key Cryptography - PKC 2003","author":"J.C. Cha","year":"2002","unstructured":"Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 18\u201330. Springer, Heidelberg (2002)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11586821_29","volume-title":"Cryptography and Coding","author":"L. Chen","year":"2005","unstructured":"Chen, L., Cheng, Z.: Security proof of Sakai-Kasahar\u2019s identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol.\u00a03796, pp. 442\u2013459. Springer, Heidelberg (2005)"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"L. Chen","year":"2006","unstructured":"Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.: An efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings Information Security\u00a0153(1), 19\u201326 (2006)","journal-title":"IEE Proceedings Information Security"},{"key":"7_CR23","unstructured":"Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. International Journal of Information Security. This paper has been submitted to IEEE P 1363.3 (to appear), available at \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/submissions\/index.html"},{"key":"7_CR24","unstructured":"Chen, L., Harrison, K.: Multiple trusted authorities in identifier based cryptography from pairings on elliptic curves. HP Technical Report, HPL-2003-48, Available at \n                    \n                      http:\/\/www.hpl.hp.com\/techreports\/2003\/HPL-2003-48.html"},{"key":"7_CR25","unstructured":"Chen, L., Harrison, K., Malone-Lee, J. (as co-inventors): Identifier-based signcryption with two trusted authorities. GB patent GB2416282 A: Application No. GB200415774A, filed on July 15, 2004 (published on January 18, 2006)"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/3-540-45811-5_25","volume-title":"Information Security","author":"L. Chen","year":"2002","unstructured":"Chen, L., Harrison, K., Moss, A., Smart, N., Soldera, D.: Certification of public keys within an identity based system. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 322\u2013333. Springer, Heidelberg (2002)"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-45831-X_18","volume-title":"Infrastructure Security","author":"L. Chen","year":"2002","unstructured":"Chen, L., Harrison, K., Smart, N., Soldera, D.: Applications of multiple trust authorities in pairing based cryptosystems. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 260\u2013275. Springer, Heidelberg (2002)"},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/CSFW.2003.1212715","volume-title":"Proceedings of the 16th IEEE Computer Security Foundations Workshop","author":"L. Chen","year":"2003","unstructured":"Chen, L., Kudla, C.: Identity-based authenticated key agreement from pairings. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219\u2013233. IEEE, Los Alamitos (2003)"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography - PKC 2005","author":"L. Chen","year":"2005","unstructured":"Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 362\u2013379. Springer, Heidelberg (2005)"},{"issue":"3\/4","key":"7_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1504\/IJSN.2007.013178","volume":"2","author":"Z. Cheng","year":"2007","unstructured":"Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto\u2019s key agreement protocol and its variants. International Journal of Security and Networks\u00a02(3\/4), 251\u2013259 (2007)","journal-title":"International Journal of Security and Networks"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing\u00a033, 167\u2013226 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.amc.2003.12.092","volume":"162","author":"Y. Choie","year":"2005","unstructured":"Choie, Y., Jeong, E., Lee, E.: Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation\u00a0162, 179\u2013188 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"7_CR33","unstructured":"Choudary Gorantla, M., Gangishetti, R., Saxena, A.: A survey on ID-based cryptographic primitives. Cryptology ePrint Archive, Report 2005\/094"},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An identity-based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","first-page":"111","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"Y. Desmedt","year":"1987","unstructured":"Desmedt, Y., Quisquater, J.: Public-key systems based on the difficulty of tampering (is there a difference between DES and RSA?). In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 111\u2013117. Springer, Heidelberg (1987)"},{"key":"7_CR36","unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: a survey. Cryptology ePrint Archive, Report 2004\/064"},{"key":"7_CR37","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solution to identityfication and signature schemes. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"7_CR38","unstructured":"Galbraith, S., Paterson, K., Smart, N.P.: Pairings for cryptographers. Cryptology ePrint Archive, Report 2006\/165"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"C. Gentry","year":"2003","unstructured":"Gentry, C.: Certificate-Based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) Advances in Cryptology \u2013 EUROCRPYT 2003. LNCS, vol.\u00a02656, pp. 272\u2013293. Springer, Heidelberg (2003)"},{"key":"7_CR40","unstructured":"Girault, M., Paill\u00e8s, J.C.: An identity-based scheme providing zero-knowledge authentication and authenticated key exchange. In: Proceeedings of First European Symposium on Research in Computer Security \u2013 ESORICS 1990, AFCET, pp. 173\u2013184 (1990)"},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","first-page":"202","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"M. Girault","year":"1988","unstructured":"Girault, M., Stern, J.: On the length of cryptographic hash-values used in identification schemes. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 202\u2013215. Springer, Heidelberg (1988)"},{"key":"7_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L. Guillou","year":"1990","unstructured":"Guillou, L., Quisquater, J.: A paradoxical identity-based signature scheme resulting from zeroknowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 216\u2013231. Springer, Heidelberg (1990)"},{"key":"7_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"key":"7_CR44","unstructured":"ISO\/IEC 9594-8:2001(the 4th edn.): Information technology \u2013 Open Systems Interconnection \u2013 The Directory: Public-key and attribute certificate frameworks. International Organization for Standardization, Geneva, Switzerland (2001)"},{"key":"7_CR45","unstructured":"ISO\/IEC 11770-3:1999: Information technology \u2013 Security techniques \u2013 Key management \u2013 Part 3: Mechanisms using asymmetric techniques. International Organization for Standardization, Geneva, Switzerland (1999)"},{"key":"7_CR46","unstructured":"ISO\/IEC 14888-2:1998: Information technology \u2013 Security techniques \u2013 Digital signatures with appendix \u2013 Part 2: Identity-based mechanisms. International Organization for Standardization, Geneva, Switzerland (1998)"},{"key":"7_CR47","unstructured":"ISO\/IEC 14888-3:2006: Information technology \u2013 Security techniques \u2013 Digital signatures with appendix \u2013 Part 3: Discrete logarithm based mechanisms. International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"7_CR48","unstructured":"IEEE P 1363.3, \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/index.html"},{"key":"7_CR49","unstructured":"Li, S., Yuan, Q., Li, J.: Towards security two-part authenticated key agreement protocols. Cryptology ePrint Archive, Report 2005\/300"},{"key":"7_CR50","volume-title":"Proceedings of IEEE Information Theory Workshop 2003","author":"B. Libert","year":"2003","unstructured":"Libert, B., Quisquater, J.: New identity based signcryption schemes from pairings. In: Proceedings of IEEE Information Theory Workshop 2003, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"7_CR51","unstructured":"McCullagh, N., Barreto, P.: Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report 2004\/117"},{"key":"7_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.: A new two-party identity-based authenticated key agreement. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"issue":"2","key":"7_CR53","first-page":"481","volume":"E85-A","author":"S. Mitsunari","year":"2002","unstructured":"Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundamentals\u00a0E85-A(2), 481\u2013484 (2002)","journal-title":"IEICE Trans. Fundamentals"},{"key":"7_CR54","unstructured":"Malone-Lee, J.: Identity-Based Signcryption. Cryptology ePrint Archive, Report 2002\/098"},{"key":"7_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/3-540-46416-6_43","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"U.M. Maurer","year":"1991","unstructured":"Maurer, U.M., Yacobi, Y.: Non-interactive public key cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 498\u2013507. Springer, Heidelberg (1991)"},{"key":"7_CR56","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1049\/el:19860880","volume":"22","author":"E. Okamoto","year":"1986","unstructured":"Okamoto, E.: Proposal for identity-based key distribution system. Electronics Letters\u00a022, 1283\u20131284 (1986)","journal-title":"Electronics Letters"},{"key":"7_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-48184-2_15","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"E. Okamoto","year":"1988","unstructured":"Okamoto, E.: Key distribution system based on identification information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 194\u2013202. Springer, Heidelberg (1988)"},{"issue":"18","key":"7_CR58","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"K. Paterson","year":"2002","unstructured":"Paterson, K.: ID-based signatures from pairings on elliptic curves. Electronic Letters\u00a038(18), 1025\u20131026 (2002)","journal-title":"Electronic Letters"},{"key":"7_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"7_CR60","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology\u00a013, 361\u2013396 (2000)","journal-title":"Journal of Cryptology"},{"key":"7_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1007\/978-3-540-24693-0_135","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"E. Ryu","year":"2004","unstructured":"Ryu, E., Yoon, E., Yoo, K.: An efficient ID-based authenticated key agreement protocol from pairings. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 1458\u20131463. Springer, Heidelberg (2004)"},{"key":"7_CR62","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003\/054"},{"key":"7_CR63","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan (January 2000)"},{"key":"7_CR64","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing over elliptic curve (in Japanese). In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (January 2001)"},{"key":"7_CR65","unstructured":"Scott, M.: Authenticated ID-based key exchange and remote log-in with insecure token and PIN number. Cryptology ePrint Archive, Report 2002\/164"},{"key":"7_CR66","unstructured":"Shacham, H.: New Paradigms in Signature Schemes. PhD Thesis, U. Stanford (2005)"},{"key":"7_CR67","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"7_CR68","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"7_CR69","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K. Shim","year":"2003","unstructured":"Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters\u00a039, 653\u2013654 (2003)","journal-title":"Electronics Letters"},{"key":"7_CR70","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The arithmetic of elliptic curve","author":"J. Silverman","year":"1986","unstructured":"Silverman, J.: The arithmetic of elliptic curve. Springer, Heidelberg (1986)"},{"issue":"13","key":"7_CR71","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N. Smart","year":"2002","unstructured":"Smart, N.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters\u00a038(13), 630\u2013632 (2002)","journal-title":"Electronics Letters"},{"key":"7_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-48184-2_29","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"H. Tanaka","year":"1988","unstructured":"Tanaka, H.: A realization scheme for the identity-based cryptosystem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 340\u2013349. Springer, Heidelberg (1988)"},{"key":"7_CR73","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0167-4048(91)90052-F","volume":"10","author":"K. Tanaka","year":"1991","unstructured":"Tanaka, K., Okamoto, E.: Key distribution system for mail systems using ID-related information directory. Computers & Security\u00a010, 25\u201333 (1991)","journal-title":"Computers & Security"},{"issue":"4","key":"7_CR74","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1109\/18.605586","volume":"43","author":"S. Vanstone","year":"1997","unstructured":"Vanstone, S., Zuccherato, R.: Elliptic curve cryptosystems using curves of smooth order over the ring Z\n                  \n                    n\n                  . IEEE Transactions on Information Theory\u00a043(4), 1231\u20131237 (1997)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR75","unstructured":"Wang, Y.: Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005\/108"},{"key":"7_CR76","unstructured":"Wang, S., Cao, Z., Choo, K.: New identity-based authenticated key agreement protocols from pairings (without random oracles). Cryptology ePrint Archive, Report 2006\/446"},{"key":"7_CR77","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"7_CR78","unstructured":"Xie, G.: An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005\/093"},{"key":"7_CR79","unstructured":"Yuan, Q., Li, S.: A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005\/309"},{"issue":"2","key":"7_CR80","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"X. Yi","year":"2003","unstructured":"Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Communications Letters\u00a07(2), 76\u201378 (2003)","journal-title":"IEEE Communications Letters"},{"key":"7_CR81","unstructured":"Yuen, T., Wei, V.: Constant-size hierarchical identity-based signature\/signcryption without random oracles. Cryptology ePrint Archive, Report 2005\/412"},{"key":"7_CR82","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) <\u2009< cost (signature) + cost (encryption). In: Kaliski, Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74810-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:39:38Z","timestamp":1619519978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74810-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748090","9783540748106"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74810-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}