{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:43:21Z","timestamp":1773330201511,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044731","type":"print"},{"value":"9783642044748","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_25","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"310-325","source":"Crossref","is-referenced-by-count":8,"title":["On the Security of Identity Based Ring Signcryption Schemes"],"prefix":"10.1007","author":[{"given":"S.","family":"Sharmila Deva Selvi","sequence":"first","affiliation":[]},{"given":"S.","family":"Sree Vivek","sequence":"additional","affiliation":[]},{"given":"C.","family":"Pandu Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-69304-8_14","volume-title":"Intelligence and Security Informatics","author":"M. Zhang","year":"2008","unstructured":"Zhang, M., Yang, B., Zhu, S., Zhang, W.: Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 126\u2013137. Springer, Heidelberg (2008)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Sree Vivek, S., Sharmila Deva Selvi, S., Rangan, P.: On the security of two ring signcryption schemes. Cryptology ePrint Archive, Report 2009\/052. To appear in the proceedings of SECRYPT 2009 (2009)","DOI":"10.1007\/978-3-642-04474-8_25"},{"key":"25_CR3","first-page":"649","volume-title":"AINA 2005: Proceedings of the 19th International Conference on Advanced Information Networking and Applications","author":"X. Huang","year":"2005","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: AINA 2005: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 649\u2013654. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"6","key":"25_CR4","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1007\/s11859-008-0607-1","volume":"13","author":"Y. Yu","year":"2008","unstructured":"Yu, Y., Li, F., Xu, C., Sun, Y.: An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences\u00a013(6), 670\u2013674 (2008)","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Zhang, Y., Wang, F.: An efficient and provable secure identity based ring signcryption scheme. Computer Standards & Interfaces, 649\u2013654 (2008), http:\/\/dx.doi.org\/10.1016\/j.csi.2008.09.023","DOI":"10.1016\/j.csi.2008.09.023"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Li, F., Xiong, H., Yu, Y.: An efficient id-based ring signcryption scheme. In: International Conference on Communications, Circuits and Systems, ICCCAS 2008, May 2008, pp. 483\u2013487 (2008)","DOI":"10.1109\/ICCCAS.2008.4657819"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Li, F., Shirase, M., Takagi, T.: Analysis and improvement of authenticatable ring signcryption scheme. In: International Conference ProvSec 2008, Paper appears in Journal of Shanghai Jiaotong University (Science), December 2008, vol.\u00a013-6, pp. 679\u2013683 (2008)","DOI":"10.1007\/s12204-008-0679-2"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Zhun, L., Zhang, F.: Efficient identity based ring signature and ring signcryption schemes. In: International Conference on Computational Intelligence and Security, CIS 2008, December 2008, vol.\u00a02, pp. 303\u2013307 (2008)","DOI":"10.1109\/CIS.2008.51"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45664-3_6","volume-title":"Public Key Cryptography","author":"J. Baek","year":"2002","unstructured":"Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 80\u201398. Springer, Heidelberg (2002)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Chung, Y.F., Wu, Z.Y., Chen, T.S.: Ring signature scheme for ecc-based anonymous signcryption. Computer Standards & Interfaces Journal (2008)","DOI":"10.1016\/j.csi.2008.06.004"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11496137_34","volume-title":"Applied Cryptography and Network Security","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient identity based ring signature. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 499\u2013512. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:41:29Z","timestamp":1739317289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}