{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T16:47:08Z","timestamp":1758991628335,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540887324"},{"type":"electronic","value":"9783540887331"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88733-1_4","type":"book-chapter","created":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T22:08:02Z","timestamp":1224194882000},"page":"52-67","source":"Crossref","is-referenced-by-count":31,"title":["Efficient and Provably Secure Certificateless Multi-receiver Signcryption"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"S. Sree","family":"Vivek","sequence":"additional","affiliation":[]},{"given":"Deepanshu","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Pandu","family":"Rangan Chandrasekaran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless Public-Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-73547-2_4","volume-title":"Autonomic and Trusted Computing","author":"Y. Yu","year":"2007","unstructured":"Yu, Y., Yang, B., Huang, X., Zhang, M.: Efficient identity-based signcryption scheme for multiple receivers. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol.\u00a04610, pp. 13\u201321. Springer, Heidelberg (2007)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO 1997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or How to achieve cost (signature & Encrytpion) \u226a cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-36563-X_14","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"J. Malone-Lee","year":"2003","unstructured":"Malone-Lee, J., Mao, M.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 211\u2013226. Springer, Heidelberg (2003)"},{"unstructured":"Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive. Report 2002\/098 (2002)","key":"4_CR5"},{"doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: 2003 IEEE information theory workshop, Paris, France, pp. 155\u2013158 (2003)","key":"4_CR6","DOI":"10.1109\/ITW.2003.1216718"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 383\u2013399. Springer, Heidelberg (2003)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P.S.L.M. Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 515\u2013532. Springer, Heidelberg (2005)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BFb0030430","volume-title":"Information Security","author":"Y. Zheng","year":"1998","unstructured":"Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 291\u2013312. Springer, Heidelberg (1998)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/11780656_17","volume-title":"Information Security and Privacy","author":"S. Duan","year":"2006","unstructured":"Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 195\u2013206. Springer, Heidelberg (2006)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-45664-3_4","volume-title":"Public Key Cryptography","author":"K. Kurosawa","year":"2002","unstructured":"Kurosawa, K.: Multi-recipient public-key encryption with shortened ciphertext. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 48\u201363. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Barbosa, M., Farshim, P.: Certificateless Signcryption. In: Conference on Computer and Communications Security archive Proceedings of the, ACM symposium on Information, Computer and Communications Security (2008)","key":"4_CR12","DOI":"10.1145\/1368310.1368364"},{"unstructured":"Selvi, S.S.D., Vivek, S.S., Gopalakrishnan, R., Karuturi, N.N., Rangan, C.P.: Cryptanalysis of ID-Based Signcryption Scheme for Multiple Receivers, \n                    \n                      http:\/\/eprint.iacr.org\/2008\/238.pdf","key":"4_CR13"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-39200-9_16","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"R. Canetti","year":"2003","unstructured":"Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 255\u2013271. Springer, Heidelberg (2003)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","first-page":"1611","volume-title":"Information Security and Privacy","author":"J. Baek","year":"2006","unstructured":"Baek, J., Naini, R., Susilo, W.: Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 1611\u20133349. Springer, Heidelberg (2006)"},{"unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-Based Cryptographic Protocols: A Survey, \n                    \n                      http:\/\/eprint.iacr.org\/2004\/064.pdf","key":"4_CR16"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45664-3_6","volume-title":"Public Key Cryptography","author":"J. Baek","year":"2002","unstructured":"Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 80\u201398. Springer, Heidelberg (2002)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 259\u2013274. Springer, Heidelberg (2000)"},{"unstructured":"Dent, A.W.: A Survey of Certificateless Encryption Schemes and Security Model, \n                    \n                      eprint.iacr.org\/2006\/211.pdf","key":"4_CR19"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-78440-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"A.W. Dent","year":"2008","unstructured":"Dent, A.W., Libert, B., Paterson, K.G.: Certificateless Encryption Schemes Strongly Secure in the Standard Model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 344\u2013359. Springer, Heidelberg (2008)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/11745853_31","volume-title":"Public Key Cryptography - PKC 2006","author":"B. Libert","year":"2006","unstructured":"Libert, B., Quisquate, J.-J.: On Constructing Certificateless Cryptosystems from Identity Based Encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 474\u2013490. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Hui, L.C.K., Yiu, S.M., Chow, K.P.: Two Improved Partially Blind Signature Schemes from Bilinear Pairings. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 316\u2013328. Springer, Heidelberg (2005)","key":"4_CR22","DOI":"10.1007\/11506157_27"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88733-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T04:34:09Z","timestamp":1547872449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88733-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540887324","9783540887331"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88733-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}