{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:39:01Z","timestamp":1762875541670},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T00:00:00Z","timestamp":1372723200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11704-013-2305-1","type":"journal-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T12:31:23Z","timestamp":1372768283000},"page":"544-557","source":"Crossref","is-referenced-by-count":24,"title":["A novel pairing-free certificateless authenticated key agreement protocol with provable security"],"prefix":"10.1007","volume":"7","author":[{"given":"Haiyan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,2]]},"reference":[{"key":"2305_CR1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"196","author":"A Shamir","year":"1985","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47\u201353","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume":"2894","author":"S Al-Riyami","year":"2003","unstructured":"Al-Riyami S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452\u2013473","journal-title":"Lecture Notes in Computer Science"},{"issue":"3","key":"2305_CR3","first-page":"575","volume":"3","author":"S Wang","year":"2006","unstructured":"Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on the MTI\/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575\u2013581","journal-title":"Journal of Information and Computational Science"},{"issue":"1","key":"2305_CR4","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11859-006-0194-y","volume":"12","author":"Y Shi","year":"2007","unstructured":"Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71\u201374","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"2305_CR5","doi-asserted-by":"crossref","unstructured":"Luo M, Wen Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists. 2008, 1577-1582","DOI":"10.1109\/ICYCS.2008.311"},{"key":"2305_CR6","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-540-77505-8_4","volume":"4435","author":"T Mandt","year":"2007","unstructured":"Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37\u201344","journal-title":"Lecture Notes in Computer Science"},{"issue":"10","key":"2305_CR7","doi-asserted-by":"crossref","first-page":"2142","DOI":"10.1016\/j.comcom.2008.01.054","volume":"31","author":"F Wang","year":"2008","unstructured":"Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142\u20132149","journal-title":"Computer Communications"},{"key":"2305_CR8","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-642-10628-6_4","volume":"5922","author":"C Swanson","year":"2009","unstructured":"Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57\u201371","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR9","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-03298-1_14","volume":"5671","author":"G Lippold","year":"2009","unstructured":"Lippold G, Boyd C, Nieto Gonz\u00e1lez J. Strongly secure certificateless key agreement. Lecture Notes in Computer Science, 2009, 5671: 206\u2013230","journal-title":"Lecture Notes in Computer Science"},{"issue":"6","key":"2305_CR10","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1016\/j.ins.2009.11.036","volume":"180","author":"L Zhang","year":"2010","unstructured":"Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020\u20131030","journal-title":"Information Sciences"},{"issue":"1","key":"2305_CR11","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48\u201353","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2305_CR12","first-page":"177","volume-title":"Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America","author":"D Aranha","year":"2012","unstructured":"Aranha D, Faz-Hern\u00e1ndez A, L\u00f3pez J, Rodr\u00edguez-Henr\u00edquez F. Faster implementation of scalar multiplication on Koblitz curves. In: Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America. 2012, 177\u2013193"},{"key":"2305_CR13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-20465-4_5","volume":"6632","author":"D Aranha","year":"2011","unstructured":"Aranha D, Karabina K, Longa P, Gebotys C, L\u00f3pez J. Faster explicit formulas for computing pairings over ordinary curves. Lecture Notes in Computer Science, 2011, 6632: 48\u201368","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR14","first-page":"412","volume-title":"Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology","author":"M Hou","year":"2009","unstructured":"Hou M, Xu Q. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. 2009, 412\u2013416"},{"issue":"2","key":"2305_CR15","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1002\/dac.1265","volume":"25","author":"D He","year":"2012","unstructured":"He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221\u2013230","journal-title":"International Journal of Communication Systems"},{"issue":"11\u201312","key":"2305_CR16","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1016\/j.mcm.2011.08.004","volume":"54","author":"D He","year":"2011","unstructured":"He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11\u201312): 3143\u20133152","journal-title":"Mathematical and Computer Modelling"},{"key":"2305_CR17","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-642-24861-0_6","volume":"7001","author":"H Xiong","year":"2011","unstructured":"Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79\u201394","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR18","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/CIS.2009.152","volume-title":"Proceedings of the 2009 International Conference on Computational Intelligence and Security","author":"M Geng","year":"2009","unstructured":"Geng M, Zhang F. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security. 2009, 208\u2013212"},{"key":"2305_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1966913.1966924","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","author":"G Yang","year":"2011","unstructured":"Yang G, Tan C. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 2011, 71\u201379"},{"issue":"6","key":"2305_CR20","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1016\/j.camwa.2012.03.044","volume":"64","author":"D He","year":"2012","unstructured":"He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914\u20131926","journal-title":"Computers and Mathematics with Applications"},{"key":"2305_CR21","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume":"773","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P. Entity authentication and key distribution. Lecture Notes in Computer Science, 1993, 773: 232\u2013249","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR22","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume":"2045","author":"R Canetti","year":"2001","unstructured":"Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453\u2013474","journal-title":"Lecture Notes in Computer Science"},{"key":"2305_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume-title":"Proceedings of the 1st International Conference on Provable Security","author":"B LaMacchia","year":"2007","unstructured":"LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security. 2007, 1\u201316"},{"key":"2305_CR24","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/11593447_32","volume":"3788","author":"K Choo","year":"2005","unstructured":"Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585\u2013604","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"2305_CR25","first-page":"1","volume":"6","author":"D Boneh","year":"2003","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1\u201310","journal-title":"CryptoBytes"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2305-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-2305-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2305-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T01:10:36Z","timestamp":1645924236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-2305-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,2]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["2305"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-2305-1","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,2]]}}}