{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:53:00Z","timestamp":1774806780869,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T00:00:00Z","timestamp":1466812800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501333"],"award-info":[{"award-number":["61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s00500-016-2231-x","type":"journal-article","created":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T22:38:31Z","timestamp":1466807911000},"page":"6801-6810","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices"],"prefix":"10.1007","volume":"21","author":[{"given":"Debiao","family":"He","sequence":"first","affiliation":[]},{"given":"Huaqun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xianzhao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,25]]},"reference":[{"key":"2231_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Advances in cryptology-ASIACRYPT 2003, Springer, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"2231_CR2","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2005) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Public key cryptography-PKC 2005, Springer, pp 380\u2013397","DOI":"10.1007\/978-3-540-30580-4_26"},{"key":"2231_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M, Boldyreva A, Micali S (2000) Public-key encryption in a multi-user setting: security proofs and improvements. In: Advances in cryptology\u00c4\u00ceEUROCRYPT 2000, Springer, pp 259\u2013274","DOI":"10.1007\/3-540-45539-6_18"},{"key":"2231_CR4","doi-asserted-by":"crossref","unstructured":"Castiglione A, Cattaneo G, De\u00a0Santis A, Petagna F, Petrillo UF (2006) Speech: Secure personal end-to-end communication with handheld. In: ISSE 2006\u00c4\u00cesecuring electronic business processes, Springer, pp 287\u2013297","DOI":"10.1007\/978-3-8348-9195-2_31"},{"key":"2231_CR5","doi-asserted-by":"crossref","unstructured":"Castiglione A, Cattaneo G, De Maio G, Petagna F (2011) Secr3t: secure end-to-end communication over 3g telecommunication networks. In: Fifth International Conference on innovative mobile and internet services in ubiquitous computing (IMIS), 2011, IEEE , pp 520\u2013526","DOI":"10.1109\/IMIS.2011.65"},{"key":"2231_CR6","doi-asserted-by":"crossref","unstructured":"Chatterjee S, Sarkar P (2006) Multi-receiver identity-based key encapsulation with shortened ciphertext. In: Progress in cryptology-INDOCRYPT 2006, Springer, pp 394\u2013408","DOI":"10.1007\/11941378_28"},{"issue":"4","key":"2231_CR7","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/comjnl\/bxr086","volume":"55","author":"H-Y Chien","year":"2012","unstructured":"Chien H-Y (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439\u2013446","journal-title":"Comput J"},{"key":"2231_CR8","doi-asserted-by":"publisher","unstructured":"Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. doi:\n                        10.1109\/TPDS.2015.2506573","DOI":"10.1109\/TPDS.2015.2506573"},{"issue":"1","key":"2231_CR9","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Qi L, Lu ZHOU, Jiangang SHU (2015b) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"6","key":"2231_CR10","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013936","journal-title":"J Internet Technol"},{"key":"2231_CR11","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. In: IEEE transactions on information forensics and security. IEEE, p 1. doi:\n                        10.1109\/TIFS.2016.2573746","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"2231_CR12","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2016a) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci. doi:\n                        10.1007\/s11432-015-5469-5","DOI":"10.1007\/s11432-015-5469-5"},{"key":"2231_CR13","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi:\n                        10.1109\/JSYST.2016.2544805","DOI":"10.1109\/JSYST.2016.2544805"},{"issue":"8","key":"2231_CR14","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang X, Yang X, Ashley C, Jianying Z, Robert HD (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390\u20131397","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"2231_CR15","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang X, Xiang Y, Bertino E, Zhou J, Li X (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568\u2013581","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2231_CR16","doi-asserted-by":"publisher","unstructured":"Hung Y-H, Huang S-S, Tseng Y-M, Tsai T-T (2015) Efficient anonymous multireceiver certificateless encryption. doi:\n                        10.1109\/JSYST.2015.2451193","DOI":"10.1109\/JSYST.2015.2451193"},{"issue":"3","key":"2231_CR17","first-page":"277","volume":"43","author":"M-S Hwang","year":"2014","unstructured":"Hwang M-S, Hsu S-T, Lee C-C (2014) A new public key encryption with conjunctive field keyword search scheme. Inf Technol Control 43(3):277\u2013288","journal-title":"Inf Technol Control"},{"issue":"13","key":"2231_CR18","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1002\/sec.1165","volume":"8","author":"SK Islam","year":"2015","unstructured":"Islam SK, Khurram KM, Al-Khouri AM (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214\u20132231","journal-title":"Secur Commun Netw"},{"issue":"3","key":"2231_CR19","first-page":"247","volume":"42","author":"C-C Lee","year":"2013","unstructured":"Lee C-C, Lai Y-M, Chin-Ling Chen, Chen LA (2013) A novel designated verifier signature scheme based on bilinear pairing. Inf Technol Control 42(3):247\u2013252","journal-title":"Inf Technol Control"},{"key":"2231_CR20","doi-asserted-by":"crossref","unstructured":"Lee J-W, Hwang Y-H, Lee P-L (2006) Efficient public key broadcast encryption using identifier of receivers. In: Information security practice and experience. Springer, pp 153\u2013164","DOI":"10.1007\/11689522_15"},{"key":"2231_CR21","unstructured":"Lu L, Hu L (2006) Pairing-based multi-recipient public key encryption. Secur Manag 159\u2013165"},{"issue":"1","key":"2231_CR22","first-page":"317","volume":"17","author":"AK Malhi","year":"2015","unstructured":"Malhi AK, Batra S (2015) An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Math Theor Comput Sci 17(1):317\u2013338","journal-title":"Discrete Math Theor Comput Sci"},{"issue":"10","key":"2231_CR23","doi-asserted-by":"crossref","first-page":"2907","DOI":"10.3724\/SP.J.1001.2009.03552","volume":"20","author":"L Pang","year":"2009","unstructured":"Pang L, Li H, Jiao L, Wang Y (2009) Design and analysis of a provable secure multi-recipient public key encryption scheme. J Softw 20(10):2907\u20132914","journal-title":"J Softw"},{"key":"2231_CR24","doi-asserted-by":"crossref","unstructured":"Park J-H, Kim K-T, Lee D-H (2008) Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at indocrypt 06. In: Proceedings of the 2008 ACM symposium on Information, computer and communications security, ACM. pp 373\u2013380","DOI":"10.1145\/1368310.1368366"},{"issue":"2","key":"2231_CR25","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013323","journal-title":"J Internet Technol"},{"key":"2231_CR26","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Advances in cryptology. Springer, pp 47\u201353"},{"issue":"1","key":"2231_CR27","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"issue":"2","key":"2231_CR28","first-page":"159","volume":"42","author":"Y-M Tseng","year":"2013","unstructured":"Tseng Y-M, Tsai T-T, Wu T-Y (2013) Efficient revocable multi-receiver id-based encryption. Inf Technol Control 42(2):159\u2013169","journal-title":"Inf Technol Control"},{"issue":"7","key":"2231_CR29","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1002\/dac.2395","volume":"27","author":"Y-M Tseng","year":"2014","unstructured":"Tseng Y-M, Huang Y-H, Chang H-J (2014) Privacy-preserving multireceiver id-based encryption with provable security. Int J Commun Syst 27(7):1034\u20131050","journal-title":"Int J Commun Syst"},{"issue":"1","key":"2231_CR30","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1049\/iet-ifs.2010.0252","volume":"6","author":"H Wang","year":"2012","unstructured":"Wang H, Zhang Y, Xiong H, Qin B (2012) Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. Information Secur IET 6(1):20\u201327","journal-title":"Information Secur IET"},{"issue":"11","key":"2231_CR31","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/TC.2015.2401036","volume":"64","author":"J Wang","year":"2015","unstructured":"Wang J, Chen X, Huang X, You I, Xiang Yang (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Transa Comput 64(11):3293\u20133303","journal-title":"IEEE Transa Comput"},{"issue":"2","key":"2231_CR32","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-016-2231-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2231-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2231-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2231-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T02:04:27Z","timestamp":1508119467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-016-2231-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,25]]},"references-count":32,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["2231"],"URL":"https:\/\/doi.org\/10.1007\/s00500-016-2231-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,25]]}}}