{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:54Z","timestamp":1744086534150,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_4","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"35-44","source":"Crossref","is-referenced-by-count":0,"title":["ID-Based Threshold Signcryption and Group Unsigncryption"],"prefix":"10.1007","author":[{"given":"Prashant Kumar","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Kunwar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Sudhanshu","family":"Baruntar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhang, R.: A new id-based (t,n) threshold signcryption scheme. In: Progress in Informatics and Computing (PIC), vol.\u00a01, pp. 589\u2013592. IEEE (2010)","DOI":"10.1109\/PIC.2010.5687474"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) <\u2009< Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"4_CR4","first-page":"90","volume":"2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.K.: Identity based encryption from the weil pairing. IACR Cryptology ePrint Archive\u00a02001, 90 (2001)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography - PKC 2005","author":"L. Chen","year":"2005","unstructured":"Chen, L., Malone-Lee, J.: Improved Identity-Based Signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 362\u2013379. Springer, Heidelberg (2005)"},{"key":"4_CR7","first-page":"23","volume":"2003","author":"B. Libert","year":"2003","unstructured":"Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive\u00a02003, 23 (2003)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_26","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S.S.M. Chow","year":"2004","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.I., Lee, D.H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2004)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1046290.1046298","volume-title":"Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004","author":"S. Duan","year":"2004","unstructured":"Duan, S., Cao, Z., Lu, R.: Robust id-based threshold signcryption scheme from pairings. In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, pp. 33\u201337. ACM, New York (2004), http:\/\/doi.acm.org\/10.1145\/1046290.1046298"},{"key":"4_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/11596981_26","volume-title":"Computational Intelligence and Security","author":"C. Peng","year":"2005","unstructured":"Peng, C., Li, X.: An Identity-Based Threshold Signcryption Scheme with Semantic Security. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005, Part II. LNCS (LNAI), vol.\u00a03802, pp. 173\u2013179. Springer, Heidelberg (2005), http:\/\/dx.doi.org\/10.1007\/11596981_26"},{"key":"4_CR11","unstructured":"Kudo, M.: Secured electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11556992_17","volume-title":"Information Security","author":"C. Ma","year":"2005","unstructured":"Ma, C., Chen, K., Zheng, D., Liu, S.: Efficient and Proactive Threshold Signcryption. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 233\u2013243. Springer, Heidelberg (2005)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Li, F., Yu, Y.: An efficient and provably secure id-based threshold signcryption scheme. In: Communications, Circuits and Systems, ICCCAS 2008, pp. 488\u2013499 (2008)","DOI":"10.1109\/ICCCAS.2008.4657820"},{"key":"4_CR14","unstructured":"Boyd, C.:"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 120\u2013127. Springer, Heidelberg (1988)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Cryptography Theory and Practice. Chapman and Hall\/CRC (2006)","DOI":"10.1201\/9781420057133"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:14Z","timestamp":1744079354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}