{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:12:19Z","timestamp":1725570739315},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642174988"},{"type":"electronic","value":"9783642174995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17499-5_9","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T13:12:47Z","timestamp":1291727567000},"page":"202-230","source":"Crossref","is-referenced-by-count":5,"title":["Signcryption with Non-interactive Non-repudiation without Random Oracles"],"prefix":"10.1007","author":[{"given":"Jia","family":"Fan","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. An","year":"2002","unstructured":"An, J., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 56\u201373. Springer, Heidelberg (2004)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/BFb0054014","volume-title":"Public Key Cryptography","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 55\u201359. Springer, Heidelberg (1998)"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM Journal on Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45664-3_6","volume-title":"Public Key Cryptography","author":"J. Baek","year":"2002","unstructured":"Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 80\u201398. Springer, Heidelberg (2002)"},{"key":"9_CR6","first-page":"62","volume-title":"ACM-CCS 1993","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracle are practical: A paradigm for designing efficient protocols. In: ACM-CCS 1993, pp. 62\u201373. ACM press, Fairfax (1993)"},{"key":"9_CR7","first-page":"320","volume-title":"ACM-CCS 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM-CCS 2005, pp. 320\u2013329. ACM press, Alexandria (2005)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11745853_15","volume-title":"Public Key Cryptography - PKC 2006","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Shen, E., Waters, B.: Strongly Unforgeable Signatures Based on Computational Difie-Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 229\u2013240. Springer, Heidelberg (2006)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_26","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S.S.M. Chow","year":"2004","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.I., Lee, D.H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2004)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-79263-5_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"I. Damgard","year":"2008","unstructured":"Damgard, I., Holfheins, D., Kiltz, E., Thorbek, R.: Public-Key with Non-interactive Opening. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 239\u2013255. Springer, Heidelberg (2008)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-12678-9_20","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"D. Galindo","year":"2010","unstructured":"Galindo, D., Libert, B., Fischlin, M., Fuchsbauer, G., Lehmann, A., Manulis, M., Schroder, D.: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol.\u00a06055, pp. 333\u2013350. Springer, Heidelberg (2010)"},{"key":"9_CR13","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers, Cryptology ePrint Archive: Report 2006\/165, \n                  \n                    http:\/\/eprint.iacr.org\/2006\/165"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11586821_9","volume-title":"Cryptography and Coding","author":"J. Malone-Lee","year":"2005","unstructured":"Malone-Lee, J.: A general Construction for Simutaneous Signing and Encrypting. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 116\u2013135. Springer, Heidelberg (2005)"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10623-004-3806-6","volume":"37","author":"J. Malone-Lee","year":"2005","unstructured":"Malone-Lee, J.: Signcryption with Non-interactive Non-repudiation. J. Designs, Codes and Cryptography\u00a037(1), 81\u2013109 (2005)","journal-title":"J. Designs, Codes and Cryptography"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-01440-6_6","volume-title":"Information Security and Cryptology","author":"F. Li","year":"2009","unstructured":"Li, F., Shirase, M., Takagi, T.: Efficient Signcryption Key Encapsulation without Random Oracles. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol.\u00a05487, pp. 47\u201359. Springer, Heidelberg (2009)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-24632-9_14","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"B. Libert","year":"2004","unstructured":"Libert, B., Quisquater, J.J.: Efficient signcryption with key privacy from gap Diffie-Hellman groups. In: Bao, F., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 187\u2013200. Springer, Heidelberg (2004)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-30598-9_16","volume-title":"Security in Communication Networks","author":"B. Libert","year":"2005","unstructured":"Libert, B., Quisquater, J.J.: Improved Signcryption from q-Diffie-Hellman Problems. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 220\u2013234. Springer, Heidelberg (2005)"},{"key":"9_CR19","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332 (2004)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-36552-4_3","volume-title":"Information Security and Cryptology - ICISC 2002","author":"J.B. Shin","year":"2003","unstructured":"Shin, J.B., Lee, K., Shim, K.: New DSA-verifiable signcryption schemes. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 35\u201347. Springer, Heidelberg (2003)"},{"issue":"1","key":"9_CR21","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1093\/ietfec\/e89-a.1.206","volume":"E89-A","author":"C.H. Tan","year":"2006","unstructured":"Tan, C.H.: Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems. J. IEICE Transactions\u00a0E89-A(1), 206\u2013208 (2006)","journal-title":"J. IEICE Transactions"},{"key":"9_CR22","first-page":"1148","volume-title":"ARES 2007","author":"C.H. Tan","year":"2007","unstructured":"Tan, C.H.: Insider-secure Hybrid Signcryption Scheme Without Random Oracles. In: ARES 2007, pp. 1148\u20131154. IEEE Press, Vienna (2007)"},{"key":"9_CR23","first-page":"1275","volume-title":"ARES 2008","author":"C.H. Tan","year":"2008","unstructured":"Tan, C.H.: Insider-secure Signcryption KEM\/Tag-KEM Schemes without Random Oracles. In: ARES 2008, pp. 1275\u20131281. IEEE Press, Barcelona (2008)"},{"issue":"6","key":"9_CR24","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3923\/jas.2009.1025.1035","volume":"9","author":"M. Toorani","year":"2009","unstructured":"Toorani, M., Shirazi, A.A.B.: An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy. J. Applied Sciences\u00a09(6), 1025\u20131035 (2009)","journal-title":"J. Applied Sciences"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (signature& encryption)\u226a cost(signature)+cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science X"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17499-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:50:44Z","timestamp":1619787044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17499-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174988","9783642174995"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17499-5_9","relation":{},"ISSN":["0302-9743","1866-4741"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1866-4741"}],"subject":[],"published":{"date-parts":[[2010]]}}}