{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T02:54:12Z","timestamp":1768704852762,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1007\/s11390-010-9367-4","type":"journal-article","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T22:35:33Z","timestamp":1278887733000},"page":"807-826","source":"Crossref","is-referenced-by-count":10,"title":["Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model"],"prefix":"10.1007","volume":"25","author":[{"given":"Qiong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,11]]},"reference":[{"key":"9367_CR1","doi-asserted-by":"crossref","unstructured":"Huang Q, Wong D S. Generic certificateless key encapsulation mechanism. In Proc. ACISP 2007, Townsville, Australia, July 2\u20134, 2007, pp.215\u2013229.","DOI":"10.1007\/978-3-540-73458-1_17"},{"key":"9367_CR2","doi-asserted-by":"crossref","unstructured":"Huang Q, Wong D S. Generic certificateless encryption in the standard model. In Proc. IWSEC 2007, Nara, Japan, Oct. 29\u201331, 2007, pp.278\u2013291.","DOI":"10.1007\/978-3-540-75651-4_19"},{"key":"9367_CR3","doi-asserted-by":"crossref","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 1984, Santa Barbara, USA, Aug. 16\u201320, 1984, pp.47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"9367_CR4","doi-asserted-by":"crossref","unstructured":"Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, Taipei, China, Nov. 30-Dec. 4, 2003, pp.452\u2013473.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"9367_CR5","doi-asserted-by":"crossref","unstructured":"Yum D H, Lee P J. Generic construction of certificateless signature. In Proc. ACISP 2004, Sydney, Australia, July 13\u201314, 2004, pp.200\u2013211.","DOI":"10.1007\/978-3-540-27800-9_18"},{"key":"9367_CR6","doi-asserted-by":"crossref","unstructured":"Huang X, Susilo W, Mu Y, Zhang F. On the security of certificateless signature schemes from Asiacrypt 2003. In Proc. CANS 2005, Xiamen, China, Oct. 31-Nov. 3, 2005, pp.13\u201325.","DOI":"10.1007\/11599371_2"},{"key":"9367_CR7","doi-asserted-by":"crossref","unstructured":"Libert B, Quisquater J J. On constructing certificateless cryptosystems from identity based encryption. In Proc. PKC 2006, New York, USA, April 24\u201326, 2006, pp.474\u2013490.","DOI":"10.1007\/11745853_31"},{"key":"9367_CR8","doi-asserted-by":"crossref","unstructured":"Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. In Proc. ACISP 2006, Melbourne, Australia, July 3\u20135, 2006, pp.235\u2013246.","DOI":"10.1007\/11780656_20"},{"key":"9367_CR9","doi-asserted-by":"crossref","unstructured":"Au M H, Chen J K, Liu J K, Mu Y, Wong D S, Yang G. Malicious KGC attacks in certificateless cryptography. In Proc. ASIACCS 2007, Singapore, Mar. 20\u201322, 2007, pp.302\u2013311.","DOI":"10.1145\/1229285.1266997"},{"key":"9367_CR10","doi-asserted-by":"crossref","unstructured":"Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model. In Proc. ASIACCS 2007, Singapore, Mar. 20\u201322, 2007, pp.302\u2013311.","DOI":"10.1145\/1229285.1266994"},{"key":"9367_CR11","doi-asserted-by":"crossref","unstructured":"Yum D H, Lee P J. Generic construction of certificateless encryption. In Proc. ICCSA 2004, Assisi, Italy, May 14\u201317, 2004, pp.802\u2013811.","DOI":"10.1007\/978-3-540-24707-4_93"},{"key":"9367_CR12","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. the First ACM Conference on Computer and Communications Security, Fairfax, USA, Nov. 3\u20135, 1993, pp.62\u201373.","DOI":"10.1145\/168588.168596"},{"issue":"1","key":"9367_CR13","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/s10986-005-0008-5","volume":"45","author":"X Li","year":"2005","unstructured":"Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005, 45(1): 76\u201383.","journal-title":"Lithuanian Mathematical Journal"},{"issue":"1","key":"9367_CR14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Computing, 2003, 33(1): 167\u2013226.","journal-title":"SIAM J. Computing"},{"key":"9367_CR15","unstructured":"Shoup V. ISO 18033-2: An emerging standard for public-key encryption (committee draft), June 2004, http:\/\/shoup.net\/iso\/ ."},{"key":"9367_CR16","doi-asserted-by":"crossref","unstructured":"Shoup V. Using hash functions as a hedge against chosen ciphertext attack. In Proc. EUROCRYPT 2000, Bruges, Belgium, May 14\u201318, 2000, pp.275\u2013288.","DOI":"10.1007\/3-540-45539-6_19"},{"key":"9367_CR17","doi-asserted-by":"crossref","unstructured":"Dent A. A designer's guide to KEMs. In Proc. Int. Workshop on Cryptography and Codings 2003, Versailles, France, Mar. 24\u201328, 2003, pp.133\u2013151.","DOI":"10.1007\/978-3-540-40974-8_12"},{"key":"9367_CR18","doi-asserted-by":"crossref","unstructured":"Abe M, Gennaro R, Kurosawa K, Shoup V. Tag-KEM\/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In Proc. EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, pp.128\u2013146.","DOI":"10.1007\/11426639_8"},{"issue":"2","key":"9367_CR19","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K Bentahar","year":"2008","unstructured":"Bentahar K, Farshim P, Malone-Lee J, Smart N P. Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 2008, 21(2): 178\u2013199.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"9367_CR20","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"L Chen","year":"2006","unstructured":"Chen L, Cheng Z, Malone-Lee J, Smart N. Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proc. Information Security, Mar. 2006, 153(1): 19\u201326.","journal-title":"IEE Proc. Information Security"},{"key":"9367_CR21","unstructured":"Abe M, Cui Y, Imai H, Kiltz E. Efficient hybrid encryption from ID-based encryption. Cryptology ePrint Archive, Report 2007\/023, 2007."},{"key":"9367_CR22","doi-asserted-by":"crossref","unstructured":"Kurosawa K, Desmedt Y. A new paradigm of hybrid encryption scheme. In Proc. the CRYPTO 2004, Santa Barbara, USA, Aug. 15\u201319, 2004, pp.426\u2013442.","DOI":"10.1007\/978-3-540-28628-8_26"},{"key":"9367_CR23","unstructured":"Herranz J, Hofheinz D, Kiltz E. The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Cryptology ePrint Archive, Report 2005\/207, 2005."},{"key":"9367_CR24","unstructured":"Sakai R, Kasahara M. ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003\/054, 2003."},{"issue":"2","key":"9367_CR25","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s00145-001-0020-9","volume":"15","author":"V Shoup","year":"2002","unstructured":"Shoup V, Gennaro R. Secure threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology, 2002, 15(2): 75\u201396.","journal-title":"Journal of Cryptology"},{"key":"9367_CR26","doi-asserted-by":"crossref","unstructured":"MacKenzie P, Reiter M K, Yang K. Alternatives to non-malleability: Definitions, constructions, and applications. In Proc. TCC 2004, Cambridge, USA, Feb. 19\u201321, 2004, pp.171\u2013190.","DOI":"10.1007\/978-3-540-24638-1_10"},{"key":"9367_CR27","doi-asserted-by":"crossref","unstructured":"Kiltz E. Chosen-ciphertext security from tag-based encryption. In Proc. TCC 2006, New York, USA, Mar. 4\u20137, 2006, pp.581\u2013600.","DOI":"10.1007\/11681878_30"},{"key":"9367_CR28","doi-asserted-by":"crossref","unstructured":"Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited. In Proc. STOC 1998, Dallas, USA, May 23\u201326, 1998, pp.209\u2013218.","DOI":"10.1145\/1008731.1008734"},{"key":"9367_CR29","doi-asserted-by":"crossref","unstructured":"Waters B. Efficient identity-based encryption without random oracles. In Proc. EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, pp.114\u2013127.","DOI":"10.1007\/11426639_7"},{"key":"9367_CR30","doi-asserted-by":"crossref","unstructured":"Gentry C. Practical identity-based encryption without random oracles. In Proc. EUROCRYPT 2006, St. Petersburg, Russia, May 28-June 1, 2006, pp.445\u2013464.","DOI":"10.1007\/11761679_27"},{"key":"9367_CR31","doi-asserted-by":"crossref","unstructured":"Kiltz E, Galindo D. Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In Proc. ACISP 2006, Melbourne, Australia, Jul. 3\u20135, 2006, pp.336\u2013347.","DOI":"10.1007\/11780656_28"},{"key":"9367_CR32","doi-asserted-by":"crossref","unstructured":"Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Proc. CRYPTO 98, Santa Barbara, USA, Aug. 22\u201327, 1998, pp.13\u201325.","DOI":"10.1007\/BFb0055717"},{"issue":"2","key":"9367_CR33","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/s11390-008-9126-y","volume":"23","author":"Q Huang","year":"2008","unstructured":"Huang Q,, Wong D S, Li J, Zhao Y. Generic transformation from weakly to strongly unforgeable signatures. Journal of Computer Science and Technology, March 2008, 23(2): 240\u2013252.","journal-title":"Journal of Computer Science and Technology"},{"key":"9367_CR34","doi-asserted-by":"crossref","unstructured":"Bellare M, Shoup S. Tow-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. In Proc. PKC 2007, Beijing, China, Apr. 16\u201320, 2007, pp.201\u2013216.","DOI":"10.1007\/978-3-540-71677-8_14"},{"issue":"4","key":"9367_CR35","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"DR Stinson","year":"1994","unstructured":"Stinson D R. Universal hashing and authentication codes. Designs, Codes, and Cryptography, 1994, 4(4): 369\u2013380.","journal-title":"Designs, Codes, and Cryptography"},{"issue":"3","key":"9367_CR36","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman M N, Carter J L. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 1981, 22(3): 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"key":"9367_CR37","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In Proc. ISC 2005, Singapore, Sept. 20\u201323, 2005, pp.134\u2013148.","DOI":"10.1007\/11556992_10"},{"issue":"2","key":"9367_CR38","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10623-006-9022-9","volume":"42","author":"BC Hu","year":"2007","unstructured":"Hu B C, Wong D S, Zhang Z, Deng X. Certificateless signature: A new security model and an improved generic construction. Designs, Codes, and Cryptography, 2007, 42(2): 109\u2013126.","journal-title":"Designs, Codes, and Cryptography"},{"key":"9367_CR39","unstructured":"Dent A W. A survey of certificateless encryption schemes and security models. Cryptology ePrint Archive, Report 2006\/211, 2007."},{"key":"9367_CR40","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J. Chosen-ciphertext security of multiple encryption. In Proc. TCC 2005, Cambridge, USA, Feb. 10\u201312, 2005, pp.188\u2013209.","DOI":"10.1007\/978-3-540-30576-7_11"},{"key":"9367_CR41","unstructured":"Dent A W. A note on game hopping proofs. Cryptology ePrint Archive, Report 2006\/260, 2006."},{"issue":"1","key":"9367_CR42","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S Even","year":"1996","unstructured":"Even S, Goldreich O, Micali S. On-line\/off-line digital signatures. J. Cryptology, 1996, 9(1): 35\u201367.","journal-title":"J. Cryptology"},{"key":"9367_CR43","doi-asserted-by":"crossref","unstructured":"Goldreich O. Foundations of Cryptography, Volume II, Basic Applications. Cambridge University Press, 2004.","DOI":"10.1017\/CBO9780511721656"},{"key":"9367_CR44","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X. Short signatures without random oracles. In Proc. EUROCRYPT 2004, Interlaken, Switzerland, May 20\u201324, 2004, pp.416\u2013432.","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"9367_CR45","doi-asserted-by":"crossref","unstructured":"Boneh D, Katz J. Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In Proc. CT-RSA 2005, San Francisco, USA, Feb. 14\u201318, 2004, pp.87\u2013103.","DOI":"10.1007\/978-3-540-30574-3_8"},{"issue":"5","key":"9367_CR46","first-page":"915","volume":"36","author":"D Boneh","year":"2006","unstructured":"Boneh D, Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. SIAM J. Computing, 2006, 36(5): 915\u2013942.","journal-title":"SIAM J. Computing"},{"key":"9367_CR47","unstructured":"May T. Timed-release crypto. Manuscript, 1993, http:\/\/www.hks.net.cpunks\/cpunks-0\/1560.html ."},{"key":"9367_CR48","doi-asserted-by":"crossref","unstructured":"Mao W. Timed release cryptography. In Proc. SAC 2001, Toronto, Canada, Mar. 11\u201314, 2001, pp.342\u2013357.","DOI":"10.1007\/3-540-45537-X_27"},{"key":"9367_CR49","doi-asserted-by":"crossref","unstructured":"Chalkias K, Hristu-Varsakelis D, Stephanides G. Improved anonymous timed-release encryption. In Proc. ESORICS 2007, Dresden, Germany, Sept. 24\u201326, 2007, pp.311\u2013326.","DOI":"10.1007\/978-3-540-74835-9_21"},{"key":"9367_CR50","doi-asserted-by":"crossref","unstructured":"Chow S S M, Roth V, Rieffel E G. General certificateless encryption and timed-release encryption. In Proc. SCN 2008, Amalfi, Italy, Sept. 10\u201312, 2008, pp.126\u2013143.","DOI":"10.1007\/978-3-540-85855-3_9"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-010-9367-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-010-9367-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-010-9367-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T01:04:43Z","timestamp":1685667883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-010-9367-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["9367"],"URL":"https:\/\/doi.org\/10.1007\/s11390-010-9367-4","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}