{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:36:06Z","timestamp":1765355766053},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T00:00:00Z","timestamp":1384473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11704-013-3090-6","type":"journal-article","created":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T13:17:40Z","timestamp":1384521460000},"page":"163-173","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis and improvement of a certificateless encryption scheme in the standard model"],"prefix":"10.1007","volume":"8","author":[{"given":"Lin","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,15]]},"reference":[{"key":"3090_CR1","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume":"2894","author":"S S Al-riyami","year":"2003","unstructured":"Al-riyami S S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452\u2013473","journal-title":"Lecture Notes in Computer Science"},{"key":"3090_CR2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"196","author":"A Shamir","year":"1985","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47\u201353","journal-title":"Lecture Notes in Computer Science"},{"key":"3090_CR3","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/1229285.1266997","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security","author":"M H Au","year":"2007","unstructured":"Au M H, Mu Y, Chen J, Wong D S, Liu J K, Yang G. Malicious kgc attacks in certificateless cryptography. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, 302\u2013311"},{"key":"3090_CR4","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/11556992_10","volume-title":"Proceedings of the 8th International Conference on Information Security","author":"J Baek","year":"2005","unstructured":"Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In: Proceedings of the 8th International Conference on Information Security. 2005, 134\u2013148"},{"key":"3090_CR5","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/11745853_31","volume":"3958","author":"B Libert","year":"2006","unstructured":"Libert B, Quisouater J J. On constructing certificateless cryptosystems from identity based encryption. Lecture Notes in Computer Science, 2006, 3958: 474\u2013490","journal-title":"Lecture Notes in Computer Science"},{"issue":"10","key":"3090_CR6","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1007\/s11432-010-4076-8","volume":"53","author":"Y Sun","year":"2010","unstructured":"Sun Y, Li H. Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Science China Information Sciences, 2010, 53(10): 2005\u20132015","journal-title":"Science China Information Sciences"},{"key":"3090_CR7","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. 1993, 62\u201373"},{"key":"3090_CR8","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1007\/978-3-540-24707-4_93","volume":"3043","author":"D H Yum","year":"2004","unstructured":"Yum D H, Lee P J. Generic construction of certificateless encryption. Lecture Notes in Computer Science, 2004, 3043: 802\u2013811","journal-title":"Lecture Notes in Computer Science"},{"issue":"4","key":"3090_CR9","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11390-010-9367-4","volume":"25","author":"Q Huang","year":"2010","unstructured":"Huang Q, Wong D S. Generic certificateless encryption secure against malicious-but-passive kgc attacks in the standard model. Journal of Computer Science and Technology, 2010, 25(4): 807\u2013826","journal-title":"Journal of Computer Science and Technology"},{"key":"3090_CR10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/11780656_20","volume":"4058","author":"B C Hu","year":"2006","unstructured":"Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. Lecture Notes in Computer Science, 2006, 4058: 235\u2013246","journal-title":"Lecture Notes in Computer Science"},{"key":"3090_CR11","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1229285.1266994","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security","author":"J K Liu","year":"2007","unstructured":"Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, 273\u2013283"},{"key":"3090_CR12","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-540-78440-1_20","volume":"4939","author":"A W Dent","year":"2008","unstructured":"Dent A W, Libert B, Paterson K G. Certificateless encryption schemes strongly secure in the standard model. Lecture Notes in Computer Science, 2008, 4939: 344\u2013359","journal-title":"Lecture Notes in Computer Science"},{"key":"3090_CR13","doi-asserted-by":"crossref","unstructured":"Guo H, Zhang X, Mu Y, Li Z. An efficient certificateless encryption scheme in the standard model. In: Proceedings of the 3rd International Conference on Network and System Security. 2009, 302-309","DOI":"10.1109\/NSS.2009.31"},{"issue":"3","key":"3090_CR14","first-page":"463","volume":"14","author":"Y H Hwang","year":"2008","unstructured":"Hwang Y H, Liu J K, Chow S S. Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science, 2008, 14(3): 463\u2013480","journal-title":"Journal of Universal Computer Science"},{"issue":"4","key":"3090_CR15","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/S1007-0214(09)70101-4","volume":"14","author":"G Zhang","year":"2009","unstructured":"Zhang G, Wang X. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452\u2013459","journal-title":"Tsinghua Science & Technology"},{"key":"3090_CR16","first-page":"329","volume-title":"Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems","author":"L Shen","year":"2012","unstructured":"Shen L, Zhang F, Sun Y, Li S. Cryptanalysis of a certificateless encryption scheme in the standard model. In: Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems. 2012, 329\u2013333"},{"issue":"5","key":"3090_CR17","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10207-008-0055-0","volume":"7","author":"A W Dent","year":"2008","unstructured":"Dent A W. A survey of certificateless encryption schemes and security models. International Journal of Information Security, 2008, 7(5): 349\u2013377","journal-title":"International Journal of Information Security"},{"key":"3090_CR18","volume-title":"Efficient certificateless public key encryption","author":"Z Cheng","year":"2005","unstructured":"Cheng Z, Comley R. Efficient certificateless public key encryption. IACR Cryptology Eprint Archive: Report 2005\/249, 2005"},{"key":"3090_CR19","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-75651-4_19","volume-title":"Proceedings of the 2nd International Conference on Advances in Information and Computer Security","author":"Q Huang","year":"2007","unstructured":"Huang Q, Wong D S. Generic certificateless encryption in the standard model. In: Proceedings of the 2nd International Conference on Advances in Information and Computer Security. 2007, 278\u2013291"},{"key":"3090_CR20","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-540-73458-1_17","volume-title":"Proceedings of the 12th Australasian Conference on Information Security and Privacy","author":"Q Huang","year":"2007","unstructured":"Huang Q, Wong D S. Generic certificateless key encapsulation mechanism. In: Proceedings of the 12th Australasian Conference on Information Security and Privacy. 2007, 215\u2013229"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-3090-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-3090-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-3090-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T15:04:49Z","timestamp":1688655889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-3090-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,15]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["3090"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-3090-6","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,15]]}}}