{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:33:20Z","timestamp":1725496400422},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_63","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"686-691","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006"],"prefix":"10.1007","author":[{"given":"Je Hong","family":"Park","sequence":"first","affiliation":[]},{"given":"Bo Gyeong","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: Proc. of ASIACCS 2007, pp. 302\u2013311 (2007)","DOI":"10.1145\/1229285.1266997"},{"key":"63_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"63_CR4","unstructured":"Cao, X., Paterson, K.G., Kou, W.: An attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006\/367"},{"key":"63_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/11596981_16","volume-title":"Computational Intelligence and Security","author":"M.C. Gorantla","year":"2005","unstructured":"Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 110\u2013116. Springer, Heidelberg (2005)"},{"key":"63_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11780656_20","volume-title":"Information Security and Privacy","author":"B.C. Hu","year":"2006","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 235\u2013246. Springer, Heidelberg (2006)"},{"key":"63_CR7","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10623-006-9022-9","volume":"42","author":"B.C. Hu","year":"2007","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless signature: A new security model and an improved generic construction. Des. Codes. Crypt.\u00a042, 109\u2013126 (2007)","journal-title":"Des. Codes. Crypt."},{"key":"63_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"ACISP 2007","author":"X. Huang","year":"2007","unstructured":"Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, Springer, Heidelberg (2007)"},{"key":"63_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11599371_2","volume-title":"Cryptology and Network Security","author":"X. Huang","year":"2005","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 13\u201325. Springer, Heidelberg (2005)"},{"key":"63_CR10","doi-asserted-by":"crossref","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: Certificateless designated verifier signature schemes. In: Proc. of AINA 2006, pp. 15\u201319 (2006)","DOI":"10.1007\/11833529_89"},{"key":"63_CR11","series-title":"Lecture Notes in Artificial Intelligence","first-page":"453","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"H.S. Ju","year":"2005","unstructured":"Ju, H.S., Kim, D.Y., Lee, D.H., Lim, J., Chun, K.: Efficient revocation of security capability in certificateless public key cryptography. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03681, pp. 453\u2013459. Springer, Heidelberg (2005)"},{"key":"63_CR12","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s10986-005-0008-5","volume":"45","author":"X. Li","year":"2005","unstructured":"Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal\u00a045, 76\u201383 (2005)","journal-title":"Lithuanian Mathematical Journal"},{"key":"63_CR13","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model. In: Proc. of ASIACCS 2007, pp. 273\u2013283 (2007)","DOI":"10.1145\/1229285.1266994"},{"key":"63_CR14","unstructured":"Park, J.H.: An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006\/442"},{"key":"63_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/11807964_33","volume-title":"EUC 2006","author":"W.-S. Yap","year":"2006","unstructured":"Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC 2006. LNCS, vol.\u00a04097, pp. 322\u2013331. Springer, Heidelberg (2006)"},{"key":"63_CR16","unstructured":"Zhang, Z., Feng, D.: Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006\/453"},{"key":"63_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-3-540-74472-6_48","volume-title":"ICCSA 2007. Part I","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Mao, J.: Security analysis of two signature schemes and their improved schemes. In: Gervasi, O., Gavrilova, O. (eds.) ICCSA 2007. Part I. LNCS, vol.\u00a04705, pp. 589\u2013602. Springer, Heidelberg (2007)"},{"key":"63_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11767480_20","volume-title":"Applied Cryptography and Network Security","author":"Z. Zhang","year":"2006","unstructured":"Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 293\u2013308. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T23:00:08Z","timestamp":1684105208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_63","relation":{},"subject":[]}}