{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T22:34:18Z","timestamp":1776378858706,"version":"3.51.2"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07637-z","type":"journal-article","created":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T07:08:57Z","timestamp":1595488137000},"page":"1465-1480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6263-547X","authenticated-orcid":false,"given":"Malik","family":"Zia Ullah Bashir","sequence":"first","affiliation":[]},{"given":"Rashid","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"issue":"177","key":"7637_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203\u2013209.","journal-title":"Mathematics of Computation"},{"issue":"2","key":"7637_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"issue":"4","key":"7637_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"7637_CR4","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997). Digital signcryption or how to achieve cost signature and encryption, cost (signature) + cost (encryption), advances in cryptology-CRYPTO. In Annual international cryptology conference (pp. 165\u2013179). Berlin: Springer.","DOI":"10.1007\/BFb0052234"},{"key":"7637_CR5","unstructured":"Jung, H. Y., Chang, K. S., Lee, D. H., & Lim, J. I. (2001). Signcryption schemes with forward secrecy. In Proceeding of information security application WISA (pp. 403\u2013475)."},{"key":"7637_CR6","doi-asserted-by":"crossref","unstructured":"Bao, F., & Deng, R. H. (1998). A signcryption scheme with signature directly verifiable by public key. In Advances in cryptology PKC 98, international workshop on public key cryptography (pp. 55\u201359). Berlin: Springer.","DOI":"10.1007\/BFb0054014"},{"key":"7637_CR7","doi-asserted-by":"crossref","unstructured":"Gamage, C., leiwo, J., & Zheng, Y. (1999). Encrypted message authentication by firewalls. In International workshop on practice and theory in public key cryptography, LNCS 1560 (pp. 69\u201381). Springer.","DOI":"10.1007\/3-540-49162-7_6"},{"issue":"6","key":"7637_CR8","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3923\/jas.2009.1025.1035","volume":"9","author":"M Toorani","year":"2009","unstructured":"Toorani, M., & Shirazi, A. A. B. (2009). An elliptic curve-based signcryption scheme with forward secrecy. Journal of Applied Sciences, 9(6), 1025\u20131035.","journal-title":"Journal of Applied Sciences"},{"key":"7637_CR9","doi-asserted-by":"crossref","unstructured":"Selvi, S. S., Vivek, S. S., Srinivasan, R., & Rangan, C. P. (2009). An efficient identity based signcryption scheme for multiple receivers. In International workshop on security (pp. 71\u201388). Springer, Berlin.","DOI":"10.1007\/978-3-642-04846-3_6"},{"issue":"9","key":"7637_CR10","doi-asserted-by":"publisher","first-page":"0975","DOI":"10.5120\/10112-4777","volume":"62","author":"R Ahirwal","year":"2013","unstructured":"Ahirwal, R., & Jain, A. (2013). Signcryption scheme that utilizes elliptic curve for both encryption and signature generation. International Journal of Computer Applications, 62(9), 0975\u20138887.","journal-title":"International Journal of Computer Applications"},{"issue":"8","key":"7637_CR11","first-page":"3651","volume":"2","author":"OS Rao","year":"2010","unstructured":"Rao, O. S., & Setty, S. P. (2010). Efficient mapping methods for elliptic curve cryptosystem. International journal of engineering and technology, 2(8), 3651\u20133656.","journal-title":"International journal of engineering and technology"},{"key":"7637_CR12","doi-asserted-by":"crossref","unstructured":"Iqbal, W., Afzal, M., & Ahmad, F. (2013). An efficient elliptic curve based signcryption scheme for firewalls. In 2nd national conference on information assurance (NCIA) (pp. 67\u201372). IEEE Computer Society.","DOI":"10.1109\/NCIA.2013.6725326"},{"key":"7637_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0208857","volume":"13","author":"M Zia","year":"2018","unstructured":"Zia, M., & Ali, R. (2018). Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls. PLoS ONE, 13, 1\u201311.","journal-title":"PLoS ONE"},{"key":"7637_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques (pp. 416\u2013432). Springer.","DOI":"10.1007\/3-540-39200-9_26"},{"issue":"8","key":"7637_CR15","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1049\/el.2019.0032","volume":"55","author":"M Zia","year":"2019","unstructured":"Zia, M., & Ali, R. (2019). Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron. Lett., 55(8), 457\u2013459.","journal-title":"Electron. Lett."},{"key":"7637_CR16","doi-asserted-by":"publisher","unstructured":"Ullah, R., Nizamuddin, A. & Iqbal, A. N. (2014). Blind signcryption scheme based on elliptic curve. In Conference on information assurance and cyber security (CIACS) (pp. 51\u201354). IEEE 12\u201313. https:\/\/doi.org\/10.1109\/CIACS.2014.6861332.","DOI":"10.1109\/CIACS.2014.6861332."},{"issue":"6","key":"7637_CR17","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"7637_CR18","volume-title":"Cryptography and network security","author":"W Stallings","year":"2000","unstructured":"Stallings, W. (2000). Cryptography and network security (4th ed.). Upper Saddle River: Prentice Hall.","edition":"4"},{"key":"7637_CR19","unstructured":"Elkamachouchi, H. M., Nasr, M. E., & Ismail, R. (2009). A new efficient publicly verifiable signcryption scheme and its multiple recipients variant for firewalls implementation. In: IEEE 26th National Radio science conference (pp. 1\u20139)."},{"key":"7637_CR20","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","volume":"68","author":"Y Zheng","year":"1998","unstructured":"Zheng, Y., & Imai, H. (1998). How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, 68, 227\u2013233.","journal-title":"Information Processing Letters"},{"key":"7637_CR21","doi-asserted-by":"crossref","unstructured":"Han, Y., Yang, X., Yiliang, H., Xiaoyuan, Y., Ping, W., Yuming, W., & Yupu, H. (2006). Elliptic curve based generalized signcryption. In International conference on ubiquitous intelligence and computing (pp. 956\u2013965). Springer.","DOI":"10.1007\/11833529_97"},{"key":"7637_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, X. (2009). Improved signcryption scheme with public verifiability, knowledge engineering and software engineering. In Pacific-Aisa conference on KESE 09 (pp. 178\u2013181).","DOI":"10.1109\/KESE.2009.54"},{"issue":"1","key":"7637_CR23","first-page":"395","volume":"9","author":"E Mohammad","year":"2009","unstructured":"Mohammad, E., & Elkamchouchi, H. M. (2009). Elliptic curve signcryption with encrypted message authentication and forward secrecy. International Journal of Computer Science and Network Security, 9(1), 395\u2013398.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"7637_CR24","doi-asserted-by":"crossref","unstructured":"Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on computer and communications security (CCS\u201993), (pp. 62\u201373).","DOI":"10.1145\/168588.168596"}],"updated-by":[{"DOI":"10.1007\/s11277-021-08750-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07637-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07637-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07637-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T10:24:35Z","timestamp":1629195875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07637-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,23]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7637"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07637-z","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11277-021-08750-3","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,23]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-021-08750-3","URL":"https:\/\/doi.org\/10.1007\/s11277-021-08750-3","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}