{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T04:51:38Z","timestamp":1764132698083,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332715"},{"type":"electronic","value":"9783642332722"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33272-2_4","type":"book-chapter","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T13:45:33Z","timestamp":1345643133000},"page":"35-52","source":"Crossref","is-referenced-by-count":19,"title":["ID Based Signcryption Scheme in Standard Model"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"S. Sree","family":"Vivek","sequence":"additional","affiliation":[]},{"given":"Dhinakaran","family":"Vinayagamurthy","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.H. An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P.S.L.M. Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 515\u2013532. Springer, Heidelberg (2005)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-71677-8_14","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Shoup, S.: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 201\u2013216. Springer, Heidelberg (2007)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11745853_15","volume-title":"Public Key Cryptography - PKC 2006","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Shen, E., Waters, B.: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 229\u2013240. Springer, Heidelberg (2006)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose Identity-Based Signcryption A Swiss Army Knife for Identity-based Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 383\u2013399. Springer, Heidelberg (2003)"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R. Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM\u00a051(4), 557\u2013594 (2004)","journal-title":"J. ACM"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography - PKC 2005","author":"L. Chen","year":"2005","unstructured":"Chen, L., Malone-Lee, J.: Improved Identity-Based Signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 362\u2013379. Springer, Heidelberg (2005)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_26","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S.S.M. Chow","year":"2004","unstructured":"Chow, S.S.M., Yiu, S.-M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2004)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 445\u2013464. Springer, Heidelberg (2006)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s11390-008-9126-y","volume":"23","author":"Q. Huang","year":"2008","unstructured":"Huang, Q., Wong, D., Li, J., Zhao, Y.-M.: Generic transformation from weakly to strongly unforgeable signatures. Journal of Computer Science and Technology\u00a023, 240\u2013252 (2008), doi:10.1007\/s11390-008-9126-y","journal-title":"Journal of Computer Science and Technology"},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.compeleceng.2009.12.009","volume":"36","author":"Z. Jin","year":"2010","unstructured":"Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Computers & Electrical Engineering\u00a036(3), 545\u2013552 (2010)","journal-title":"Computers & Electrical Engineering"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-79263-5_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"E. Kiltz","year":"2008","unstructured":"Kiltz, E., Vahlis, Y.: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 221\u2013238. Springer, Heidelberg (2008)"},{"issue":"1","key":"4_CR13","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1587\/transfun.E94.A.268","volume":"94-A","author":"F. Li","year":"2011","unstructured":"Li, F., Liao, Y., Qin, Z.: Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions\u00a094-A(1), 268\u2013269 (2011)","journal-title":"IEICE Transactions"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-24316-5_10","volume-title":"Provable Security","author":"F. Li","year":"2011","unstructured":"Li, F., Muhaya, F.B., Zhang, M., Takagi, T.: Efficient Identity-Based Signcryption in the Standard Model. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol.\u00a06980, pp. 120\u2013137. Springer, Heidelberg (2011)"},{"key":"4_CR15","unstructured":"Li, F., Takagi, T.: Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling (2011), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0895717711003840"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. In: IEEE Information Theory Workshop 2003, pp. 155\u2013158 (January 2003), extended version","DOI":"10.1109\/ITW.2003.1216718"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-24632-9_14","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"B. Libert","year":"2004","unstructured":"Libert, B., Quisquater, J.-J.: Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 187\u2013200. Springer, Heidelberg (2004)"},{"key":"4_CR18","unstructured":"Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive, Report 2002\/098 (2002), http:\/\/eprint.iacr.org\/"},{"key":"4_CR19","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference (2003)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11780656_18","volume-title":"Information Security and Privacy","author":"K.G. Paterson","year":"2006","unstructured":"Paterson, K.G., Schuldt, J.C.N.: Efficient Identity-Based Signatures Secure in the Standard Model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 207\u2013222. Springer, Heidelberg (2006)"},{"key":"4_CR21","unstructured":"Sharmila\u00a0Deva Selvi, S., Sree Vivek, S., Vinayagamurthy, D., Pandu Rangan, C.: On the security of ID based signcryption schemes. Cryptology ePrint Archive, Report 2011\/664 (2011), http:\/\/eprint.iacr.org\/"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/11941378_14","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"I. Teranishi","year":"2006","unstructured":"Teranishi, I., Oyama, T., Ogata, W.: General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 191\u2013205. Springer, Heidelberg (2006)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Qian, H.F.: Attacks against two identity-based signcryption schemes. In: Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), vol.\u00a01, pp. 24\u201327 (April 2010)","DOI":"10.1109\/NSWCTC.2010.14"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X.A., Zhong, W., Luo, H.: Cryptanalysis of efficient identity based signature\/signcryption schemes in the standard model. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), pp. 622\u2013625 (October 2010)","DOI":"10.1109\/IPTC.2010.111"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Yanli, R., Dawu, G.: Efficient identity based signature\/signcryption scheme in the standard model. In: The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 133\u2013137 (2007)","DOI":"10.1109\/ISDPE.2007.76"},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.csi.2007.10.014","volume":"31","author":"Y. Yu","year":"2009","unstructured":"Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces\u00a031(1), 56\u201362 (2009)","journal-title":"Computer Standards & Interfaces"},{"issue":"6","key":"4_CR29","first-page":"1923","volume":"6","author":"B. Zhang","year":"2010","unstructured":"Zhang, B.: Cryptanalysis of an identity based signcryption scheme without random oracles. Journal of Computational Information Systems\u00a06(6), 1923\u20131931 (2010)","journal-title":"Journal of Computational Information Systems"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-13601-6_12","volume-title":"Intelligence and Security Informatics","author":"M. Zhang","year":"2010","unstructured":"Zhang, M., Li, P., Yang, B., Wang, H., Takagi, T.: Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. In: Chen, H., Chau, M., Li, S.-H., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol.\u00a06122, pp. 98\u2013104. Springer, Heidelberg (2010)"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) <\u2009< Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33272-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T02:44:02Z","timestamp":1743993842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33272-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332715","9783642332722"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33272-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}