{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:49:14Z","timestamp":1725540554101},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642046414"},{"type":"electronic","value":"9783642046421"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04642-1_7","type":"book-chapter","created":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T07:05:26Z","timestamp":1257750326000},"page":"61-75","source":"Crossref","is-referenced-by-count":3,"title":["Breaking and Fixing of an Identity Based Multi-Signcryption Scheme"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"S. Sree","family":"Vivek","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.H. An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45664-3_6","volume-title":"Public Key Cryptography","author":"J. Baek","year":"2002","unstructured":"Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 80\u201398. Springer, Heidelberg (2002)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11967668_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Neven, G.: Identity-based multi-signatures from rsa. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 145\u2013162. Springer, Heidelberg (2007)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 383\u2013399. Springer, Heidelberg (2003)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","first-page":"352","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S.S.M. Chow","year":"2003","unstructured":"Chow, S.S.M., Yiu, S.-M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2003)"},{"key":"7_CR6","unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. In: Cryptology ePrint Archive, Report 2004\/064 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"7_CR7","unstructured":"Malone-Lee, J.: Identity-based signcryption. In: Cryptology ePrint Archive, Report 2002\/098 (2002)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/10718964_25","volume-title":"Information Security and Privacy","author":"S. Mitomi","year":"2000","unstructured":"Mitomi, S., Miyaji, A.: A multisignature scheme with message flexibility, order flexibility and order verifiability. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 298\u2013312. Springer, Heidelberg (2000)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/DASFAA.2003.1192368","volume-title":"Eighth International Conference on Database Systems for Advanced Applications - DASFAA 2003","author":"X. Pang","year":"2003","unstructured":"Pang, X., Catania, B., Tan, K.-L.: Securing your data in agent-based p2p systems. In: Eighth International Conference on Database Systems for Advanced Applications - DASFAA 2003, pp. 55\u201364. IEEE Computer Society, Los Alamitos (2003)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1007\/978-3-540-24768-5_74","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"S.-H. Seo","year":"2004","unstructured":"Seo, S.-H., Lee, S.-H.: A secure and flexible multi-signcryption scheme. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 689\u2013697. Springer, Heidelberg (2004)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.comcom.2008.07.004","volume":"32","author":"J. Zhang","year":"2009","unstructured":"Zhang, J., Mao, J.: A novel identity-based multi-signcryption scheme. Computer Communications\u00a032(1), 14\u201318 (2009)","journal-title":"Computer Communications"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04642-1_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:09:42Z","timestamp":1619766582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04642-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642046414","9783642046421"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04642-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}