{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:29:27Z","timestamp":1765438167105},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T00:00:00Z","timestamp":1279756800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1007\/s10207-010-0110-5","type":"journal-article","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T08:56:49Z","timestamp":1279702609000},"page":"297-311","source":"Crossref","is-referenced-by-count":27,"title":["How to construct identity-based signatures without the key escrow problem"],"prefix":"10.1007","volume":"9","author":[{"given":"Tsz Hon","family":"Yuen","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,22]]},"reference":[{"key":"110_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452\u2013473 Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"110_CR2","doi-asserted-by":"crossref","unstructured":"Au, M.H., Huang, Q., Liu, J.K., Susilo, W., Wong, D.S., Yang, G.: Traceable and retrievable identity-based encryption. In: ACNS 2008, LNCS, vol. 5037, pp. 94\u2013110 (2008)","DOI":"10.1007\/978-3-540-68914-0_6"},{"key":"110_CR3","doi-asserted-by":"crossref","unstructured":"Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: ASIACCS 2007, pp. 302\u2013311. ACM (2007) doi: 10.1145\/1229285.1266997","DOI":"10.1145\/1229285.1266997"},{"key":"110_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: ASIACRYPT 2001, LNCS, vol. 2248, pp. 566\u2013582. Springer (2001)","DOI":"10.1007\/3-540-45682-1_33"},{"key":"110_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: EUROCRYPT 2004, LNCS, vol. 3027, pp. 268\u2013286. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_17"},{"key":"110_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Palacio, A.: GQ and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In: CRYPTO 2002, LNCS, vol. 2442, pp. 162\u2013177. Springer (2002)","DOI":"10.1007\/3-540-45708-9_11"},{"key":"110_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: EUROCRYPT 2004, LNCS, vol. 3027, pp. 56\u201373. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"110_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: CRYPTO 2001, LNCS, vol. 2139, pp. 213\u2013229. Springer (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"110_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: ASIACRYPT 2001, LNCS, vol. 2248, pp. 514\u2013532. Springer (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"110_CR10","doi-asserted-by":"crossref","unstructured":"Chase, M., Lysyanskaya, A.: On signatures of knowledge. In: CRYPTO 2006, LNCS, vol. 4117, pp. 78\u201396. Springer (2006)","DOI":"10.1007\/11818175_5"},{"issue":"6","key":"110_CR11","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1007\/s11767-005-0065-2","volume":"23","author":"X. Chen","year":"2006","unstructured":"Chen X., Zhang F., Kim K.: New id-based group signature from pairings. J. Electron. (China) 23(6), 892\u2013900 (2006)","journal-title":"J. Electron. (China)"},{"key":"110_CR12","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M.: Removing escrow from identity-based encryption. In: PKC 2009, LNCS, vol. 5443, pp. 256\u2013276. Springer (2009)","DOI":"10.1007\/978-3-642-00468-1_15"},{"key":"110_CR13","doi-asserted-by":"crossref","unstructured":"Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: ASIACRYPT 2006, LNCS, vol. 4284, pp. 178\u2013193. Springer (2006)","DOI":"10.1007\/11935230_12"},{"key":"110_CR14","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: EUROCRYPT 2003, LNCS, vol. 2656, pp. 272\u2013293. Springer (2003)","DOI":"10.1007\/3-540-39200-9_17"},{"key":"110_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: ASIACRYPT 2002, LNCS, vol. 2501, pp. 548\u2013566. Springer (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"110_CR16","doi-asserted-by":"crossref","unstructured":"Girault, M.: Self-certified public keys. In: EUROCRYPT \u201991, LNCS, vol. 547, pp. 490\u2013497. Springer (1991)","DOI":"10.1007\/3-540-46416-6_42"},{"key":"110_CR17","doi-asserted-by":"crossref","unstructured":"Goyal, V.: Reducing trust in the PKG in Identity Based Cryptosystems. In: CRYPTO 2007, LNCS, vol. 4622, pp. 430\u2013447. Springer (2007)","DOI":"10.1007\/978-3-540-74143-5_24"},{"key":"110_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: CCS 2008, pp. 427\u2013436. ACM (2008)","DOI":"10.1145\/1455770.1455824"},{"key":"110_CR19","doi-asserted-by":"crossref","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: ACISP 2006, LNCS, vol. 4058, pp. 235\u2013246. Springer (2006)","DOI":"10.1007\/11780656_20"},{"key":"110_CR20","doi-asserted-by":"crossref","unstructured":"Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: CT-RSA 2004, LNCS, vol. 2964, pp. 99\u2013111. Springer (2004)","DOI":"10.1007\/978-3-540-24660-2_8"},{"key":"110_CR21","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: Security model and efficient construction. In: EuroPKI 2007, LNCS, vol. 4582, pp. 110\u2013125. Springer (2007)","DOI":"10.1007\/978-3-540-73408-6_8"},{"key":"110_CR22","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: CRYPTO \u201984, LNCS, vol. 196, pp. 47\u201353. Springer (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"110_CR23","doi-asserted-by":"crossref","unstructured":"Sui, A.F., Chow, S.S.M., Hui, L.C.K., Yiu, S.M., Chow, K.P., Tsang, W.W., Chong, C.F., Pun, K.K.H., Chan, H.W.: Separable and anonymous identity-based key issuing. In: ICPADS 2005, pp. 275\u2013279. IEEE Computer Society (2005)","DOI":"10.1109\/ICPADS.2005.263"},{"key":"110_CR24","unstructured":"Yuen, T.H., Susilo, W., Mu, Y.: How to construct identity-based signatures without the key escrow problem. Cryptology ePrint Archive, Report 2009\/421 (2009). To appear in EuroPKI 2009"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0110-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0110-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0110-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T06:39:57Z","timestamp":1685687997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0110-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,22]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["110"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0110-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,22]]}}}