{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:23Z","timestamp":1725558683886},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540756507"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75651-4_19","type":"book-chapter","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T03:01:07Z","timestamp":1190343667000},"page":"278-291","source":"Crossref","is-referenced-by-count":26,"title":["Generic Certificateless Encryption in the Standard Model"],"prefix":"10.1007","author":[{"given":"Qiong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Proc. ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"19_CR2","first-page":"302","volume-title":"ACM ASIACCS 2007","author":"M.H. Au","year":"2007","unstructured":"Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: ACM ASIACCS 2007, pp. 302\u2013311. ACM Press, New York (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2006\/255"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Proc. EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 56\u201373. Springer, Heidelberg (2004)"},{"issue":"5","key":"19_CR4","first-page":"915","volume":"36","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Computing\u00a036(5), 915\u2013942 (2006)","journal-title":"SIAM J. Computing"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-540-30574-3_8","volume-title":"Topics in Cryptology - CT-RSA 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Katz, J.: Improved efficiency for cca-secure cryptosystems built using identity-based encryption. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 87\u2013103. Springer, Heidelberg (2005)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","volume-title":"Proc. EUROCRYPT 2004","author":"R. Canetti","year":"2004","unstructured":"Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 207\u2013222. Springer, Heidelberg (2004)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-540-30576-7_11","volume-title":"Proc. TCC 2005","author":"Y. Dodis","year":"2005","unstructured":"Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 188\u2013209. Springer, Heidelberg (2005)"},{"issue":"2","key":"19_CR8","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2000","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. SIAM J. Computing\u00a030(2), 391\u2013437 (2000)","journal-title":"SIAM J. Computing"},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S. Even","year":"1996","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/off-line digital signatures. J. of Cryptology\u00a09(1), 35\u201367 (1996)","journal-title":"J. of Cryptology"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/11774716_7","volume-title":"EuroPKI 2006","author":"D. Galindo","year":"2006","unstructured":"Galindo, D., Morillo, P., Rafols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol.\u00a04043, pp. 81\u201391. Springer, Heidelberg (2006)"},{"key":"19_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography, Basic Applications","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography, Basic Applications, vol.\u00a0II. Cambridge University Press, Cambridge (2004)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","first-page":"235","volume-title":"Information Security and Privacy: 11th Australian Conference, ACISP 2006","author":"B.C. Hu","year":"2006","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 235\u2013246. Springer, Heidelberg (2006)"},{"issue":"2","key":"19_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10623-006-9022-9","volume":"42","author":"B.C. Hu","year":"2007","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless signature: A new security model and an improved generic construction. Designs, Codes, and Cryptography\u00a042(2), 109\u2013126 (2007)","journal-title":"Designs, Codes, and Cryptography"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/11599371_2","volume-title":"Cryptology and Network Security, 4th International Conference, CANS 2005","author":"X. Huang","year":"2005","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 13\u201325. Springer, Heidelberg (2005)"},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s10986-005-0008-5","volume":"45","author":"X. Li","year":"2005","unstructured":"Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal\u00a045(1), 76\u201383 (2005)","journal-title":"Lithuanian Mathematical Journal"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/11745853_31","volume-title":"9th International Conference on Theory and Practice in Public Key Cryptography, PKC 2006","author":"B. Libert","year":"2006","unstructured":"Libert, B., Quisquater, J.-J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 474\u2013490. Springer, Heidelberg (2006)"},{"key":"19_CR17","first-page":"273","volume-title":"ACM ASIACCS\u201907","author":"J.K. Liu","year":"2007","unstructured":"Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model. In: ACM ASIACCS\u201907, pp. 273\u2013283. ACM Press, New York (2007), Full paper at \n                    \n                      http:\/\/eprint.iacr.org\/2006\/373"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Proc. CRYPTO 1984","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Proc. EUROCRYPT 1997","author":"V. Shoup","year":"1997","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 256\u2013266. Springer, Heidelberg (1997)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1007\/978-3-540-24707-4_93","volume-title":"ICCSA 2004","author":"D.H. Yum","year":"2004","unstructured":"Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: Lagan\u00e0, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 802\u2013811. Springer, Heidelberg (2004)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-540-27800-9_18","volume-title":"Information Security and Privacy: 9th Australian Conference, ACISP 2004","author":"D.H. Yum","year":"2004","unstructured":"Yum, D.H., Lee, P.J.: Generic construction of certificateless signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 200\u2013211. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75651-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:26:39Z","timestamp":1619504799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75651-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540756507"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75651-4_19","relation":{},"subject":[]}}