{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T00:31:58Z","timestamp":1687307518375},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,5,10]],"date-time":"2014-05-10T00:00:00Z","timestamp":1399680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11432-013-4983-6","type":"journal-article","created":{"date-parts":[[2014,5,10]],"date-time":"2014-05-10T09:45:17Z","timestamp":1399715117000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext"],"prefix":"10.1007","volume":"57","author":[{"given":"DeHua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"ChaoWen","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]},{"given":"MinRong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"KeFei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,10]]},"reference":[{"key":"4983_CR1","first-page":"165","volume-title":"Proceedings of 17th Annual International Cryptology Conference on Advances in Cryptology-Cryptpo, Santa Barbara","author":"Y L Zheng","year":"1997","unstructured":"Zheng Y L. Digital signcryption or how to achieve cost(signature & encryption) \u2329\u2329 cost(signature) + cost(encryption). In: Proceedings of 17th Annual International Cryptology Conference on Advances in Cryptology-Cryptpo, Santa Barbara, 1997. 165\u2013179"},{"key":"4983_CR2","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","volume":"68","author":"Y L Zheng","year":"1998","unstructured":"Zheng Y L, Imai H. How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett, 1998, 68: 227\u2013233","journal-title":"Inf Process Lett"},{"key":"4983_CR3","first-page":"83","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam","author":"J H An","year":"2002","unstructured":"An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 83\u2013107"},{"key":"4983_CR4","first-page":"220","volume-title":"Proceedings of 4th International Conference on Security in Communication Networks (SCN 2005), Amalfi","author":"B Libert","year":"2005","unstructured":"Libert B, Quisquater J J. Improved signcryption from q-Diffie-Hellman problems. In: Proceedings of 4th International Conference on Security in Communication Networks (SCN 2005), Amalfi, 2005. 220\u2013234"},{"key":"4983_CR5","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-540-24632-9_14","volume-title":"Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004), Singapore","author":"B Libert","year":"2004","unstructured":"Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups. In: Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004), Singapore, 2004. 187\u2013200"},{"key":"4983_CR6","first-page":"211","volume-title":"Proceedings of the Cryptographers\u2019 Track at the RSA Conference (CT-RSA 2003), San Francisco","author":"L J Malone","year":"2003","unstructured":"Malone L J, Mao W. Two birds one stone: signcryption using RSA. In: Proceedings of the Cryptographers\u2019 Track at the RSA Conference (CT-RSA 2003), San Francisco, 2003. 211\u2013226"},{"key":"4983_CR7","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/11937807_10","volume-title":"Proceedings of Information Security and Cryptology, Beijing","author":"C Ma","year":"2006","unstructured":"Ma C. Efficient short signcryption scheme with public verifiability. In: Proceedings of Information Security and Cryptology, Beijing, 2006. 118\u2013129"},{"key":"4983_CR8","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s11432-007-2018-x","volume":"50","author":"Z Hu","year":"2007","unstructured":"Hu Z, Lin D, Wu W, et al. Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci China Ser F-Inf Sci, 2007, 50: 82\u201398","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4983_CR9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-540-89598-5_5","volume-title":"Proceedings of Advances in Information and Computer Security, 3rd International Workshop on Security (IWSEC 2008), Kagawa","author":"C H Tan","year":"2008","unstructured":"Tan C H. Signcryption scheme in multi-user setting without random oracles. In: Proceedings of Advances in Information and Computer Security, 3rd International Workshop on Security (IWSEC 2008), Kagawa, 2008. 64\u201382"},{"key":"4983_CR10","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11432-010-0061-5","volume":"53","author":"Y X Sun","year":"2010","unstructured":"Sun Y X, Li H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci China Inf Sci, 2010, 53: 557\u2013566","journal-title":"Sci China Inf Sci"},{"key":"4983_CR11","first-page":"383","volume-title":"Proceedings of Advances in Cryptology, 23rd Annual International Cryptology Conference (CRYPTO 2003), Santa Barbara","author":"X Boyen","year":"2003","unstructured":"Boyen X. Multipurpose identity-based signcryption. In: Proceedings of Advances in Cryptology, 23rd Annual International Cryptology Conference (CRYPTO 2003), Santa Barbara, 2003. 383\u2013399"},{"key":"4983_CR12","first-page":"649","volume-title":"Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei","author":"X Huang","year":"2005","unstructured":"Huang X, Susilo W, Mu Y, et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, 2005. 649\u2013654"},{"key":"4983_CR13","first-page":"515","volume-title":"Proceedings of Advances in Cryptology, 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2005), Chennai","author":"P S L Barreto","year":"2005","unstructured":"Barreto P S LM, Libert B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Proceedings of Advances in Cryptology, 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2005), Chennai, 2005. 515\u2013532"},{"key":"4983_CR14","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.mcm.2012.06.030","volume":"57","author":"X Li","year":"2013","unstructured":"Li X, Qian H, Weng J, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math Comput Model, 2013, 57: 503\u2013511","journal-title":"Math Comput Model"},{"key":"4983_CR15","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/1368310.1368364","volume-title":"Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), Tokyo","author":"M Barbosa","year":"2008","unstructured":"Barbosa M, Farshim P. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), Tokyo, 2008. 369\u2013372"},{"key":"4983_CR16","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-642-00843-6_11","volume-title":"Proceedings of 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Xi\u2019an","author":"F Li","year":"2009","unstructured":"Li F, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Proceedings of 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Xi\u2019an, 2009. 112\u2013123"},{"key":"4983_CR17","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.ins.2010.09.037","volume":"181","author":"J Weng","year":"2011","unstructured":"Weng J, Yao G, Deng R H, et al. Cryptanalysis of a certificateless signcryption scheme in the standard model. Inform Sciences, 2011, 181: 661\u2013667","journal-title":"Inform Sciences"},{"key":"4983_CR18","doi-asserted-by":"crossref","first-page":"2530","DOI":"10.1007\/s11432-012-4635-2","volume":"55","author":"T Y Youn","year":"2012","unstructured":"Youn T Y, Hong D. Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci China Inf Sci, 2012, 55: 2530\u20132541","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4983-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-013-4983-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4983-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:54Z","timestamp":1559403474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-013-4983-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,10]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["4983"],"URL":"https:\/\/doi.org\/10.1007\/s11432-013-4983-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,10]]}}}