{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:01:06Z","timestamp":1777449666831,"version":"3.51.4"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T00:00:00Z","timestamp":1337126400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10623-012-9688-0","type":"journal-article","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T02:18:20Z","timestamp":1337048300000},"page":"323-345","source":"Crossref","is-referenced-by-count":9,"title":["Signcryption schemes with threshold unsigncryption, and applications"],"prefix":"10.1007","volume":"70","author":[{"given":"Javier","family":"Herranz","sequence":"first","affiliation":[]},{"given":"Alexandre","family":"Ruiz","sequence":"additional","affiliation":[]},{"given":"Germ\u00e1n","family":"S\u00e1ez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,16]]},"reference":[{"key":"9688_CR1","unstructured":"An J.H., Dodis Y., Rabin T.: On the security of joint signature and encryption. Proceedings of Eurocrypt\u201902, LNCS, vol. 2332, pp. 83\u2013107. Springer (2002)."},{"key":"9688_CR2","unstructured":"Bellare M., Rogaway P.: Minimizing the use of random oracles in authenticated encryption schemes. Proceedings of Information and Communications Security\u201997, LNCS, vol. 1334, pp. 1\u201316. Springer (1997)."},{"key":"9688_CR3","unstructured":"Boneh D., Boyen X.: Efficient selective-ID secure identity-based encryption without random oracles. Proceedings of Eurocrypt\u201904, LNCS, vol. 3027, pp. 223\u2013238. Springer (2004)."},{"key":"9688_CR4","unstructured":"Boneh D., Boyen X., Halevi S.: Chosen ciphertext secure public key threshold encryption without random oracles. Proceedings of CT-RSA\u201906, LNCS, vol. 3860, pp. 226\u2013243. Springer (2006)."},{"key":"9688_CR5","unstructured":"Boneh D., Shen E., Waters B.: Strongly unforgeable signatures based on Computational Diffie-Hellman. Proceedings of PKC\u201906, LNCS, vol. 3958, pp. 229\u2013240. Springer (2006)."},{"key":"9688_CR6","unstructured":"Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Adaptive security for threshold cryptosystems. Proceedings of Crypto\u201999, LNCS, vol. 1666, pp. 98\u2013115. Springer (1999)."},{"key":"9688_CR7","unstructured":"Canetti R., Krawczyk H., Nielsen J.B.: Relaxing chosen-ciphertext security. Proceedings of Crypto\u201903, LNCS, vol. 2729, pp. 565\u2013582. Springer (2003)."},{"key":"9688_CR8","unstructured":"Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. Proceedings of Eurocrypt\u201904, LNCS, vol. 3027, pp. 207\u2013222. Springer (2004)."},{"issue":"1","key":"9688_CR9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R. Gennaro","year":"2007","unstructured":"Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Secure distributed key generation for Discrete-Log based cryptosystems. J. Cryptol. 20(1), 51\u201383 (2007)","journal-title":"J. Cryptol."},{"key":"9688_CR10","unstructured":"Herranz J., Ruiz A., S\u00e1ez G.: Fully secure threshold unsigncryption. Proceedings of ProvSec\u201910, LNCS, vol. 6402, pp. 261\u2013278. Springer (2010)."},{"key":"9688_CR11","unstructured":"Jarecki S., Lysyanskaya A.: Adaptively secure threshold cryptography: introducing concurrency, removing erasures. Proceedings of Eurocrypt\u201900, LNCS, vol. 1807, pp. 221\u2013242. Springer (2000)."},{"key":"9688_CR12","unstructured":"Koo J.H., Kim H.J., Jeong I.R., Lee D.H., Lim J.I.: Jointly unsigncryptable signcryption schemes. Proceedings of WISA\u201901, vol. 2, pp. 397\u2013407 (2001)."},{"key":"9688_CR13","unstructured":"Li F., Gao J., Hu Y.: ID-based threshold unsigncryption scheme from pairings. Proceedings of CISC\u201905, LNCS, vol. 3822, pp. 242\u2013253. Springer (2005)."},{"issue":"2","key":"9688_CR14","first-page":"155","volume":"3","author":"F. Li","year":"2006","unstructured":"Li F., Xin X., Hu Y.: ID-based signcryption scheme with (t, n) shared unsigncryption. Int. J. Netw. Secur. 3(2), 155\u2013159 (2006)","journal-title":"Int. J. Netw. Secur."},{"key":"9688_CR15","unstructured":"Li J., Yuen T.H., Kim K.: Practical threshold signatures without random oracles. Proceedings of ProvSec\u201907, LNCS, vol. 4784, pp. 198\u2013207. Springer (2007)."},{"key":"9688_CR16","unstructured":"Lysyanskaya A., Peikert C.: Adaptive security in the threshold setting: from cryptosystems to signature schemes. Proceedings of Asiacrypt\u201901, LNCS, vol. 2248, pp. 331\u2013350. Springer (2001)."},{"key":"9688_CR17","unstructured":"Mohassel P.: One-time signatures and chameleon hash functions. Proceedings of SAC\u201910, LNCS, vol. 6544, pp. 302\u2013319. Springer (2011)."},{"issue":"3","key":"9688_CR18","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"9688_CR19","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"9688_CR20","unstructured":"Sharmila Deva Selvi S., Sree Vivek S., Priti S., Pandu Rangan C.: On the security of identity based threshold unsigncryption schemes. Proceedings of APWCS\u20192010, available at http:\/\/eprint.iacr.org\/2010\/360 (2010)."},{"key":"9688_CR21","unstructured":"Shoup V.: Lower bounds for discrete logarithms and related problems. Proceedings of Eurocrypt\u201997, LNCS, vol. 1233, pp. 256\u2013266. Springer (1997)."},{"issue":"2","key":"9688_CR22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s00145-001-0020-9","volume":"15","author":"V. Shoup","year":"2002","unstructured":"Shoup V., Gennaro R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptol. 15(2), 75\u201396 (2002)","journal-title":"J. Cryptol."},{"key":"9688_CR23","unstructured":"Stinson D.R., Strobl R.: Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates. Proceedings of ACISP\u201901, LNCS, vol. 2119, pp. 417\u2013434. Springer (2001)."},{"key":"9688_CR24","unstructured":"Wang H., Zhang Y., Feng D.: Short threshold signature schemes without random oracles. Proceedings of Indocrypt\u201905, LNCS, vol. 3797, pp. 297\u2013310. Springer (2005)."},{"key":"9688_CR25","unstructured":"Yang B., Yu Y., Li F., Sun Y.: Provably secure identity-based threshold unsigncryption scheme. Proceedings of ATC\u201907, LNCS, vol. 4610, pp. 114\u2013122. Springer (2007)."},{"key":"9688_CR26","unstructured":"Zhang Z., Mian C., Jin Q.: Signcryption scheme with threshold shared unsigncryption preventing malicious receivers. Proceedings of TENCON\u201902, IEEE Computer Society, vol. 2, pp. 196\u2013199 (2002)."},{"key":"9688_CR27","unstructured":"Zheng Y.: Digital signcryption or How to achieve cost(signature & encryption) < < cost(signature) + cost(encryption). Proceedings of Crypto\u201997, LNCS, vol. 1294, pp. 165\u2013179. Springer (1997)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9688-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9688-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9688-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:33Z","timestamp":1559246313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9688-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,16]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9688"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9688-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,16]]}}}