{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T16:29:27Z","timestamp":1749486567302},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_24","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"320-333","source":"Crossref","is-referenced-by-count":2,"title":["Practical Certificateless Public Key Encryption in the Standard Model"],"prefix":"10.1007","author":[{"given":"Wenjie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Futai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Au, M., Chen, J., Liu, J., Mu, Y., Wong, D., Yang, G.: Malicious KGC Attacks in Certificateless Cryptography. In: Proc. ASIACCS 2007, pp. 302\u2013311. ACM press (2007)","DOI":"10.1145\/1229285.1266997"},{"key":"24_CR4","unstructured":"Hwang, Y., Liu, J.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science 463\u2013480 (2008)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, G., Wang, X.: Certificateless Encryption Scheme Secure in Standard Model. Tsinghua Science and Technology 452-459 (2009)","DOI":"10.1016\/S1007-0214(09)70101-4"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Shen, L., Zhang, F., Li, S.: Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model. In: 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 (2012)","DOI":"10.1109\/iNCoS.2012.68"},{"key":"24_CR7","unstructured":"Dent, A.: A Survey of Certificateless Encryption Schemes and Security Models. Cryptology ePrint Archive, Report 2006\/211 (2006)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-78440-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"A.W. Dent","year":"2008","unstructured":"Dent, A.W., Libert, B., Paterson, K.G.: Certificateless Encryption Schemes Strongly Secure in the Standard Model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 344\u2013359. Springer, Heidelberg (2008)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-540-30580-4_27","volume-title":"Public Key Cryptography - PKC 2005","author":"S. Al-Riyami","year":"2005","unstructured":"Al-Riyami, S., Paterson, K.: CBE from CL-PKE: A Generic Construction and Efficient Schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 398\u2013415. Springer, Heidelberg (2005)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11556992_10","volume-title":"Information Security","author":"J. Baek","year":"2005","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless Public Key Encryption Without Pairing. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 134\u2013148. Springer, Heidelberg (2005)"},{"key":"24_CR11","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005\/058 (2005), http:\/\/eprint.iacr.org\/2005\/058"},{"key":"24_CR12","unstructured":"Cheng, Z., Comley, R.: Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005\/012 (2005), http:\/\/eprint.iacr.org\/2005\/012"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11599371_2","volume-title":"Cryptology and Network Security","author":"X. Huang","year":"2005","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.T.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 13\u201325. Springer, Heidelberg (2005)"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/11745853_31","volume-title":"Public Key Cryptography - PKC 2006","author":"B. Libert","year":"2006","unstructured":"Libert, B., Quisquater, J.-J.: On Constructing Certificateless Cryptosystems from Identity Based Encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 474\u2013490. Springer, Heidelberg (2006)"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-75651-4_19","volume-title":"Advances in Information and Computer Security","author":"Q. Huang","year":"2007","unstructured":"Huang, Q., Wong, D.S.: Generic Certificateless Encryption in the Standard Model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 278\u2013291. Springer, Heidelberg (2007)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Huang, Q., Wong, D.: Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model. Journal of Computer Seience and Technology, 807\u2013826 (2010)","DOI":"10.1007\/s11390-010-9367-4"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 445\u2013464. Springer, Heidelberg (2006)"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-71677-8_14","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Shoup, S.: Two-tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 201\u2013216. Springer, Heidelberg (2007)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-27800-9_18","volume-title":"Information Security and Privacy","author":"D. Yum","year":"2004","unstructured":"Yum, D., Lee, P.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 200\u2013211. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T20:28:17Z","timestamp":1687811297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}