{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:19:08Z","timestamp":1775225948831,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T00:00:00Z","timestamp":1508976000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11277-017-4995-4","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T05:30:07Z","timestamp":1508995807000},"page":"2693-2709","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["An Enhanced Certificateless Signcryption in the Standard Model"],"prefix":"10.1007","volume":"98","author":[{"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuwei","family":"Wan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,26]]},"reference":[{"key":"4995_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptography-ASIACRYPT 2003 (pp. 452\u2013473). Berlin, Germany.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"4995_CR2","unstructured":"Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. Cryptology ePrint Archive, Retrieved from \n                        http:\/\/eprint.iacr.org\/2008\/143.pdf\n                        \n                    ."},{"issue":"1","key":"4995_CR3","first-page":"81","volume":"17","author":"M Luo","year":"2016","unstructured":"Luo, M., Wang, S. Q., & Hu, J. (2016). A more efficient and secure broadcast signcryption scheme using certificateless public-key cryptography for resource-constrained networks. Journal of Internet Technology, 17(1), 81\u201389.","journal-title":"Journal of Internet Technology"},{"key":"4995_CR4","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.dam.2015.10.018","volume":"204","author":"YW Zhou","year":"2016","unstructured":"Zhou, Y. W., Yang, B., & Zhang, W. J. (2016). Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discrete Applied Mathematics, 204, 185\u2013202.","journal-title":"Discrete Applied Mathematics"},{"issue":"4","key":"4995_CR5","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., & Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM, 51(4), 557\u2013594.","journal-title":"Journal of the ACM"},{"key":"4995_CR6","doi-asserted-by":"crossref","unstructured":"Paterson, K. G., & Schuldt, J. C. N. (2006). Efficient identity-based signatures secure in the standard model. In IACR ePrint Archive, \n                        http:\/\/eprint.iacr.org\/2006\/080","DOI":"10.1007\/11780656_18"},{"issue":"1","key":"4995_CR7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.csi.2007.10.014","volume":"31","author":"Y Yu","year":"2009","unstructured":"Yu, Y., Yang, B., Sun, Y., & Zhu, S. (2009). Identity based signcryption scheme without random oracles. Computer Standards & Interfaces, 31(1), 56\u201362.","journal-title":"Computer Standards & Interfaces"},{"issue":"3","key":"4995_CR8","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.mcm.2012.06.030","volume":"57","author":"X Li","year":"2013","unstructured":"Li, X., Qian, H., Weng, J., & Yu, Y. (2013). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling, 57(3), 503\u2013511.","journal-title":"Mathematical and Computer Modelling"},{"issue":"3","key":"4995_CR9","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","volume":"180","author":"Z Liu","year":"2010","unstructured":"Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452\u2013464.","journal-title":"Information Sciences"},{"key":"4995_CR10","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.ins.2011.11.045","volume":"232","author":"S Miao","year":"2013","unstructured":"Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232, 475\u2013481.","journal-title":"Information Sciences"},{"issue":"3","key":"4995_CR11","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.ins.2010.09.037","volume":"181","author":"J Weng","year":"2011","unstructured":"Weng, J., Yao, G., Deng, R. H., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661\u2013667.","journal-title":"Information Sciences"},{"key":"4995_CR12","unstructured":"Jin, Z., Wen, Q., & Zhang, H. (2010). A supplement to Liu et al.\u2019s certificateless signcryption scheme in the standard model. Cryptology ePrint Archive, Retrieved from \n                        http:\/\/eprint.iacr.org\/2010\/252.pdf\n                        \n                    ."},{"key":"4995_CR13","unstructured":"Xiong, H. (2014). Toward Certificateless Signcryption Scheme Without Random Oracles. Cryptology ePrint Archive, Retrieved from: \n                        http:\/\/eprint.iacr.org\/2014\/162.pdf\n                        \n                    ."},{"issue":"5","key":"4995_CR14","first-page":"597","volume":"17","author":"L Cheng","year":"2015","unstructured":"Cheng, L., & Wen, Q. Y. (2015). An improved certificateless signcryption in the standard model. International Journal of Network Security, 17(5), 597\u2013606.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"4995_CR15","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s11277-016-3554-8","volume":"92","author":"CX Zhou","year":"2017","unstructured":"Zhou, C. X., Gao, G. Y., & Cui, Z. M. (2017). Certificateless signcryption in the standard model. Wireless Personal Communications, 92(2), 495\u2013513.","journal-title":"Wireless Personal Communications"},{"key":"4995_CR16","unstructured":"Au, M. H., Chen, J., Liu, J. K., Mu, Y., Wong, D. S., & Yang, G. M. (2007). Malicious KGC attacks in certificateless cryptography. In Proceedings of ASIACCS\u20192007 (pp. 302\u2013311). New York: ACM."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4995-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4995-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4995-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T12:28:03Z","timestamp":1516796883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4995-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,26]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["4995"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4995-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,26]]}}}