{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:02:03Z","timestamp":1751688123923,"version":"3.41.0"},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11432-017-9244-9","type":"journal-article","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T02:34:34Z","timestamp":1525401274000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fully distributed certificateless threshold signature without random oracles"],"prefix":"10.1007","volume":"61","author":[{"given":"Wenjie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Weiqi","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xizhao","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"9244_CR1","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.ins.2010.06.010","volume":"237","author":"H Xiong","year":"2013","unstructured":"Xiong H, Li F G, Qin Z G. Certificateless threshold signature scheme provably secure in the standard model. Inf Sci, 2013, 237: 73\u201381","journal-title":"Inf Sci"},{"key":"9244_CR2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.23919\/CJE.2014.10848034","volume":"23","author":"F T Zhang","year":"2014","unstructured":"Zhang F T, Zhang J. Efficient and information theoretical secure verifiable secret sharing over bilinear groups. Chinese J Electron, 2014, 23: 13\u201317","journal-title":"Chinese J Electron"},{"key":"9244_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R Gennaro","year":"2007","unstructured":"Gennaro R, Jarecki S, Krawczyk H, et al. Secure distributed key generation for discrete-log based cryptosystems. J Cryptol, 2007, 20: 51\u201383","journal-title":"J Cryptol"},{"key":"9244_CR4","doi-asserted-by":"publisher","first-page":"052101","DOI":"10.1007\/s11432-015-1037-2","volume":"60","author":"H G Wang","year":"2017","unstructured":"Wang H G, Chen K F, Qin B D, et al. A new construction on randomized message-locked encryption in the standard model via UCEs. Sci China Inf Sci, 2017, 60: 052101","journal-title":"Sci China Inf Sci"},{"key":"9244_CR5","doi-asserted-by":"publisher","first-page":"072103","DOI":"10.1007\/s11432-016-5535-7","volume":"60","author":"F S Wei","year":"2017","unstructured":"Wei F S, Ma J F, Zhang R J, et al. An efficient and practical threshold gateway oriented passwordauthenticated key exchange protocol in the standard model. Sci China Inf Sci, 2017, 60: 072103","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9244-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9244-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9244-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:04:45Z","timestamp":1751601885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9244-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":5,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["9244"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9244-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"19 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"098101"}}