{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:14:05Z","timestamp":1773926045955,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T00:00:00Z","timestamp":1553644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10207-019-00430-5","type":"journal-article","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T09:00:36Z","timestamp":1553677236000},"page":"619-635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model"],"prefix":"10.1007","volume":"18","author":[{"given":"Parvin","family":"Rastegari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"issue":"2","key":"430_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"430_CR2","doi-asserted-by":"crossref","unstructured":"Chaum, D., Antwerpen, H.V.: Undeniable signatures. In Advances in Cryptology, CRYPTO\u201989 Proceedings, pp. 212\u2013216. Springer, New York (1989)","DOI":"10.1007\/0-387-34805-0_20"},{"key":"430_CR3","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In Advances in Cryptology, EUROCRYPT\u201996, pp. 143\u2013154. Springer, Berlin (1996)","DOI":"10.1007\/3-540-68339-9_13"},{"key":"430_CR4","unstructured":"Chaum, D.: Private signature and proof systems, U.S. Patent 5,493,614"},{"issue":"4","key":"430_CR5","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. 15(4), 708\u2013722 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"430_CR6","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162\u2013178 (2015)","journal-title":"Inf. Sci."},{"key":"430_CR7","unstructured":"Shamir, A.: Identity-based cryptosystem and signature scheme. In: Advances in Cryptology, Crypto 84. Springer, LNCS, vol. 196, pp. 47\u201353 (1984)"},{"key":"430_CR8","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.: Certificateless public key cryptography. In: Asiacrypt 2003, Springer, LNCS , vol. 2894, pp. 452\u2013473 (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"430_CR9","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang F.: Certificateless designated verifier signature schemes. In: 20th International Conference on Advanced Information Networking and Applications (AINA\u201906), Vienna, Australia, pp. 15\u201319 (2006)"},{"key":"430_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Song, R., Zhang, F., Song, F.: An efficient certificateless short designated verifier signature scheme. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM\u201908), Dalian, China, pp. 1\u20136 (2008)","DOI":"10.1109\/WiCom.2008.1107"},{"issue":"1","key":"430_CR11","first-page":"95","volume":"18","author":"H Du","year":"2009","unstructured":"Du, H., Wen, Q.: Efficient certificateless designated verifier signatures and proxy signatures. Chin. J. Electron. 18(1), 95\u2013100 (2009)","journal-title":"Chin. J. Electron."},{"key":"430_CR12","doi-asserted-by":"crossref","unstructured":"Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: International Conference on Computational Intelligence and Security (CIS\u201909), Beijing, China, vol. 1, pp. 432\u2013436 (2009)","DOI":"10.1109\/CIS.2009.191"},{"key":"430_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Yang, B., Li, S.: Certificateless strong designated verifier signature scheme. In: 2nd International Conference on e-Business and Information System Security (EBISS), pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/EBISS.2010.5473435"},{"issue":"1","key":"430_CR14","first-page":"51","volume":"25","author":"SH Islam","year":"2013","unstructured":"Islam, S.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 25(1), 51\u201361 (2013)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"4","key":"430_CR15","first-page":"389","volume":"10","author":"D He","year":"2013","unstructured":"He, D., Chen, J.: An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4), 389\u2013396 (2013)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"4","key":"430_CR16","first-page":"573","volume":"19","author":"Y Chen","year":"2017","unstructured":"Chen, Y., Zhao, Y., Xiong, H., Yue, F.: A certificateless strong designated verifier signature scheme with non-delegatability. IJ Netw. Secur. 19(4), 573\u2013582 (2017)","journal-title":"IJ Netw. Secur."},{"key":"430_CR17","doi-asserted-by":"publisher","first-page":"50765","DOI":"10.1109\/ACCESS.2018.2809437","volume":"6","author":"HY Lin","year":"2018","unstructured":"Lin, H.Y.: A new certificateless strong designated verifier signature scheme: non-delegatable and SSA-KCA secure. IEEE Access 6, 50765\u201350775 (2018)","journal-title":"IEEE Access"},{"key":"430_CR18","unstructured":"Pakniat, N.: On the security of a certificateless strong designated verifier signature scheme. IACR Cryptology ePrint Archive (2018)"},{"key":"430_CR19","doi-asserted-by":"crossref","unstructured":"Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM, pp. 302\u2013311 (2007)","DOI":"10.1145\/1229285.1266997"},{"issue":"7","key":"430_CR20","first-page":"126","volume":"40","author":"T Liu","year":"2013","unstructured":"Liu, T., Wang, X., Ding, X.: security analysis and improvement of certificateless strong designated verifier signature scheme. Comput. Sci. 40(7), 126\u2013128 (2013). (in chinese)","journal-title":"Comput. Sci."},{"key":"430_CR21","doi-asserted-by":"crossref","unstructured":"Lin, H.Y., Ting, P.Y., Yang, L.F.: On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings. ICTCE, pp. 61\u201365 (2017)","DOI":"10.1145\/3145777.3145784"},{"key":"430_CR22","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"430_CR23","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in CryptologyCRYPTO 2001, Springer, Berlin, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"430_CR24","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Theory of Cryptography Conference, pp. 437\u2013456. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00457-5_26"},{"key":"430_CR25","first-page":"61","volume":"3783","author":"Y Li","year":"2005","unstructured":"Li, Y., Lipmaa, H., Pei, D.: On delegatability of four designated verifier signatures. ICICS 3783, 61\u201371 (2005)","journal-title":"ICICS"},{"key":"430_CR26","doi-asserted-by":"crossref","unstructured":"Tian, H., Jiang, Z., Liu, Y., Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 237\u2013244 (2012)","DOI":"10.1109\/iNCoS.2012.85"},{"issue":"5","key":"430_CR27","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10207-008-0055-0","volume":"7","author":"AW Dent","year":"2008","unstructured":"Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349\u2013377 (2008)","journal-title":"Int. J. Inf. Secur."},{"issue":"9","key":"430_CR28","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.ipl.2014.04.004","volume":"114","author":"Y Yuan","year":"2014","unstructured":"Yuan, Y., Wang, C.: Certificateless signature scheme with security enhanced in the standard model. Inf. Process. Lett. 114(9), 492\u2013499 (2014)","journal-title":"Inf. Process. Lett."},{"key":"430_CR29","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Eurocrypt\u201905 3494 , pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00430-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00430-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00430-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T12:33:29Z","timestamp":1663158809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00430-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,27]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["430"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00430-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,27]]},"assertion":[{"value":"27 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}