{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T18:40:13Z","timestamp":1683916813203},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,2,1]],"date-time":"2007-02-01T00:00:00Z","timestamp":1170288000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCI CHINA SER F"],"published-print":{"date-parts":[[2007,2]]},"DOI":"10.1007\/s11432-007-2018-x","type":"journal-article","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T16:41:05Z","timestamp":1182962465000},"page":"82-98","source":"Crossref","is-referenced-by-count":1,"title":["Constructing parallel long-message signcryption scheme from trapdoor permutation"],"prefix":"10.1007","volume":"50","author":[{"given":"ZhenYu","family":"Hu","sequence":"first","affiliation":[]},{"given":"DongDai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"WenLing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"DengGuo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2018_CR1","series-title":"LNCS","first-page":"83","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201902","author":"J. H. An","year":"2002","unstructured":"An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Knudsen L, ed. Advances in Cryptology\u2014EUROCRYPT\u201902, LNCS Vol. 2332. Berlin: Springer-Verlag, 2002. 83\u2013107. Available from http:\/\/eprint.iacr.org\/2002\/046\/"},{"key":"2018_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology\u2014CRYPTO\u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In: Kaliski B S, ed. Advances in Cryptology\u2014CRYPTO\u201997, LNCS Vol. 1294. Berlin: Springer-Verlag, 1997. 165\u2013179"},{"issue":"6","key":"2018_CR3","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","volume":"68","author":"Y. Zheng","year":"1998","unstructured":"Zheng Y, Imai H. Efficient signcryption schemes on elliptic curves. Inf Proc Lett, 1998, 68(6): 227\u2013233","journal-title":"Inf Proc Lett"},{"issue":"2","key":"2018_CR4","first-page":"140","volume":"145","author":"H. Petersen","year":"1998","unstructured":"Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes. IEEE Comput Dig Commun, 1998, 145(2): 140\u2013151","journal-title":"IEEE Comput Dig Commun"},{"issue":"2","key":"2018_CR5","first-page":"123","volume":"146","author":"W. He","year":"1999","unstructured":"He W, Wu T. Cryptanalysis and improvement of petersen-michels signcryption schemes. IEEE Comput Dig Commun, 1999, 146(2): 123\u2013124","journal-title":"IEEE Comput Dig Commun"},{"key":"2018_CR6","series-title":"LNCS","first-page":"80","volume-title":"5th International Workshop on Practice and Theory in Public Key Cryptosystems PKC 2002","author":"J. Baek","year":"2002","unstructured":"Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. In: Naccache D, Pailler P, eds. 5th International Workshop on Practice and Theory in Public Key Cryptosystems PKC 2002, LNCS Vol. 2274. Berlin: Springer-Verlag, 2002. 80\u201398"},{"key":"2018_CR7","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology\u2014EUROCRYPT94","author":"M. Bellare","year":"1995","unstructured":"Bellare M, Rogaway P. Optimal asymmetric encryption. In: Santis A D, ed. Advances in Cryptology\u2014EUROCRYPT94, LNCS Vol. 950. Berlin: Springer-Verlag, 1995. 92\u2013111. Revised version available from http:\/\/www-cse.ucsd.edu\/users\/mihir\/"},{"key":"2018_CR8","series-title":"LNCS","first-page":"240","volume-title":"Advances in Cryptology\u2014CRYPTO 2001","author":"V. Shoup","year":"2001","unstructured":"Shoup V. OAEP reconsidered. In: Kilian J, ed. Advances in Cryptology\u2014CRYPTO 2001, LNCS Vol. 2139. Berlin: Springer-Verlag, 2001. 240\u2013259"},{"key":"2018_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology\u2014EUROCRYPT 96","author":"M. Bellare","year":"1996","unstructured":"Bellare M, Rogaway P. The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer U, ed. Advances in Cryptology\u2014EUROCRYPT 96, LNCS Vol. 1070. Berlin: Springer-Verlag, 1996. 399\u2013416. Revised version appears in http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/crypto-papers.html"},{"key":"2018_CR10","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology\u2014Proceedings of CRYPTO\u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Wiener M, ed. Advances in Cryptology\u2014Proceedings of CRYPTO\u201999, LNCS Vol. 1666. Berlin: Springer-Verlag, 1999. 537\u2013554"},{"key":"2018_CR11","unstructured":"Shoup V. Aproposal for an ISO standard of public key encryption (version 2.1). Cryptology ePrint Archive, Report 2001\/112. http:\/\/eprint.iacr.org\/2001\/112"},{"key":"2018_CR12","unstructured":"Dodis Y, Freedman M J, Jarecki S, et al. Optimal signcryption from any trapdoor permutation. Cryptology ePrint Archive, Report 2004\/20. http:\/\/eprint.iacr.org\/2004\/20"},{"key":"2018_CR13","series-title":"LNCS","first-page":"210","volume-title":"Progress in Cryptology\u2014CT-RSA 2003","author":"W. Mao","year":"2003","unstructured":"Mao W, Malone-Lee J. Two birds one stone: Signcryption using RSA. In: Joye M, ed. Progress in Cryptology\u2014CT-RSA 2003, LNCS Vol. 2612. Berlin: Springer-Verlag, 2003. 210\u2013224"},{"key":"2018_CR14","unstructured":"Kobara K, Imai H. Oaep++: A very simple way to apply oaep to deterministic ow-cpa primitives. Cryptology ePrint Archive, Report 2002\/130. http:\/\/eprint.iacr.org\/2002\/130"},{"issue":"2","key":"2018_CR15","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby M, Rackoff C. How to construct pseudorandom permutations from pseudorandom functions. SIAM J Comput, 1988, 17(2): 373\u2013386","journal-title":"SIAM J Comput"},{"key":"2018_CR16","doi-asserted-by":"crossref","unstructured":"Dodis Y, Freedman M J, Walfish S. Parallel signcryption with OAEP, PSS-R, and other Feistel paddings. Cryptology ePrint Archive, Report 2003\/043. http:\/\/eprint.iacr.org\/2003\/043","DOI":"10.1088\/1126-6708\/2003\/11\/043"},{"key":"2018_CR17","unstructured":"An J H. Authenticated encryption in the public-key setting: Security notions and analyses. Cryptology ePrint Archive, Report 2001\/079. http:\/\/eprint.iacr.org\/2001\/079"},{"key":"2018_CR18","unstructured":"RSA Laboratories. PKCS #1 v2.1: RSA encryption standard, June 2002. Available from http:\/\/www.rsa.com\/rsalabs\/pubs\/PKCS\/"},{"issue":"2","key":"2018_CR19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest R L, Shamir A, Adlema L M. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 1978, 21(2): 120\u2013126","journal-title":"Commun ACM"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-2018-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-007-2018-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-2018-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T18:14:58Z","timestamp":1683915298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-007-2018-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2]]}},"alternative-id":["2018"],"URL":"https:\/\/doi.org\/10.1007\/s11432-007-2018-x","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"value":"1009-2757","type":"print"},{"value":"1862-2836","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2]]}}}