{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T01:50:54Z","timestamp":1770688254036,"version":"3.49.0"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,12,13]],"date-time":"2006-12-13T00:00:00Z","timestamp":1165968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,1,9]]},"DOI":"10.1007\/s10623-006-9022-9","type":"journal-article","created":{"date-parts":[[2006,12,12]],"date-time":"2006-12-12T18:58:18Z","timestamp":1165949898000},"page":"109-126","source":"Crossref","is-referenced-by-count":80,"title":["Certificateless signature: a new security model and an improved generic construction"],"prefix":"10.1007","volume":"42","author":[{"given":"Bessie C.","family":"Hu","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Zhenfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,13]]},"reference":[{"key":"9022_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami S.S., Paterson K.G. (2003) Certificateless public key cryptography. In Proceedings of the ASIACRYPT 2003, pages 452\u2013473. Springer-Verlag, LNCS 2894.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"9022_CR2","doi-asserted-by":"crossref","unstructured":"Bellare M., Namprempre C., Neven G. (2004) Security proofs for identity-based identification and signature schemes. In: Proceedings of the EUROCRYPT 2004, p268\u2013286. LNCS 3027. Springer-Verlag, Berlin (Full paper is available at Bellare\u2019s homepage URL: http:\/\/www-cse. ucsd.edu\/users\/mihir).","DOI":"10.1007\/978-3-540-24676-3_17"},{"key":"9022_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P. (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security. ACM Fairfax, pp62\u201373","DOI":"10.1145\/168588.168596"},{"key":"9022_CR4","doi-asserted-by":"crossref","unstructured":"Blake-Wilson S., Menezes A. (1999) Unknown key-share attacks on the station-to-station (STS) protocol. In: Public key cryptography, second international workshop on practice and theory in public key cryptography, PKC \u201999. LNCS 1560. Springer-Verlag, Berlin, pp154\u2013170","DOI":"10.1007\/3-540-49162-7_12"},{"key":"9022_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M. (2001) Identity-based encryption from the Weil pairing. In: Proceedings of the CRYPTO 2001, LNCS 2139. Springer-Verlag, Berlin, p213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"4","key":"9022_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inform Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inform Theory"},{"key":"9022_CR7","doi-asserted-by":"crossref","unstructured":"Girault M. (1991) Self-certified public keys. In: Proceedings of the EUROCRYPT 91, LNCS 547. Springer-Verlag, Berlin, p490\u2013497","DOI":"10.1007\/3-540-46416-6_42"},{"issue":"2","key":"9022_CR8","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1998","unstructured":"Goldwasser S., Micali S., Rivest R. (1998) A digital signature scheme secure against adaptive chosen-message attack. SIAM J Comput 17(2):281\u2013308","journal-title":"SIAM J Comput"},{"key":"9022_CR9","doi-asserted-by":"crossref","unstructured":"Hu B.C., Wong D.S., Zhang Z., Deng X. (2006) Key replacement attack against a generic construction of certificateless signature. In: Information security and privacy: 11th Australasian conference, ACISP 2006, LNCS 4058. Springer-Verlag, Berlin, pp235\u2013246","DOI":"10.1007\/11780656_20"},{"key":"9022_CR10","doi-asserted-by":"crossref","unstructured":"Huang X., Susilo W., Mu Y., Zhang F. (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Cryptology and network security, 4th international conference, CANS 2005, LNCS 3810. Springer-Verlag, Berlin, pp13\u201325","DOI":"10.1007\/11599371_2"},{"key":"9022_CR11","doi-asserted-by":"crossref","unstructured":"Pointcheval D., Stern J. (1996) Security proofs for signature schemes. In: Proceedings of the EUROCRYPT 96, LNCS 1070. pp387\u2013398","DOI":"10.1007\/3-540-68339-9_33"},{"key":"9022_CR12","unstructured":"Shamir A. (1984) Identity-based cryptosystems and signature schemes. In: Procedings of the CRYPTO 84, LNCS 196. Springer, Berlin, pp47\u201353"},{"key":"9022_CR13","unstructured":"Yum D.H., Lee P.J. (2004) Generic construction of certificateless signature. In: Information security and privacy: 9th Australasian Conference, ACISP 2004, LNCS 3108. Springer-Verlag, Berlin, pp200\u2013211"},{"key":"9022_CR14","doi-asserted-by":"crossref","unstructured":"Zhang F., Safavi-Naini R., Susilo W. (2004) An efficient signature scheme from bilinear pairings and its applications. In: Seventh international workshop on theory and practice in public key cryptography (PKC 2004), LNCS 2947. Springer, Berlin, pp277\u2013290","DOI":"10.1007\/978-3-540-24632-9_20"},{"key":"9022_CR15","doi-asserted-by":"crossref","unstructured":"Zhang Z., Wong D., Xu J., Feng D. (2006) Certificateless public-key signature: Security model and efficient construction. In: Fourth international conference on applied cryptography and network security (ACNS 2006), LNCS 3989. Springer, Berlin, pp293\u2013308","DOI":"10.1007\/11767480_20"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9022-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-006-9022-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9022-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:07Z","timestamp":1559245807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-006-9022-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,13]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,1,9]]}},"alternative-id":["9022"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9022-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12,13]]}}}