{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T12:48:09Z","timestamp":1759063689255},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T00:00:00Z","timestamp":1398038400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11704-014-3245-0","type":"journal-article","created":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T01:49:54Z","timestamp":1398044994000},"page":"656-666","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing"],"prefix":"10.1007","volume":"8","author":[{"given":"Wenbo","family":"Shi","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Zezhong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,21]]},"reference":[{"key":"3245_CR1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"196","author":"A Shamir","year":"1984","unstructured":"Shamir A. Identity based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1984, 196: 47\u201353","journal-title":"Lecture Notes in Computer Science"},{"key":"3245_CR2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume":"2894","author":"S Al-Riyami","year":"2003","unstructured":"Al-Riyami S, Paterson K. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452\u2013473","journal-title":"Lecture Notes in Computer Science"},{"issue":"4","key":"3245_CR3","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/S1007-0214(09)70101-4","volume":"14","author":"G Zhang","year":"2009","unstructured":"Zhang G, Wang X. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452\u2013459","journal-title":"Tsinghua Science & Technology"},{"issue":"4","key":"3245_CR4","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1049\/iet-ifs.2012.0257","volume":"7","author":"X P Yan","year":"2013","unstructured":"Yan X P, Gong P, Bai Z Q, Wang J T, Li P. New certificateless public key encryption scheme without pairing. IET Information Security, 2013, 7(4): 271\u2013276","journal-title":"IET Information Security"},{"issue":"11","key":"3245_CR5","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1002\/dac.1330","volume":"25","author":"D He","year":"2012","unstructured":"D. He, J. Chen, R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 2012, 25(11): 1432\u20131442","journal-title":"International Journal of Communication Systems"},{"key":"3245_CR6","volume-title":"International Journal of Communication Systems","author":"P Gong","year":"2012","unstructured":"Gong P, Li P. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems, 2012, DOI: 10.1002\/dac.2457"},{"issue":"9\u201310","key":"3245_CR7","first-page":"2510","volume":"57","author":"D B He","year":"2013","unstructured":"He D B, Chen Y T, Chen J H. An efficient secure certificateless proxy signature scheme without pairings. Mathematical and Computer Modelling, 2013, 57(9\u201310): 2510\u20132518","journal-title":"Mathematical and Computer Modelling"},{"issue":"2","key":"3245_CR8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1049\/iet-ifs.2012.0176","volume":"7","author":"D B He","year":"2013","unstructured":"He D B, Huang B J, Chen J H. New certificateless short signature scheme. IET Information Security, 2013, 7(2): 113\u2013117","journal-title":"IET Information Security"},{"issue":"11\u201312","key":"3245_CR9","first-page":"3143","volume":"54","author":"D B He","year":"2011","unstructured":"He D B, Chen Y T, Chen J H, Zhang R, Han W W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11\u201312): 3143\u20133152","journal-title":"Mathematical and Computer Modelling"},{"issue":"2","key":"3245_CR10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1002\/dac.1265","volume":"25","author":"D B He","year":"2012","unstructured":"He D B, Chen Y T, Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221\u2013230","journal-title":"International Journal of Communication Systems"},{"issue":"2","key":"3245_CR11","first-page":"1914","volume":"64","author":"D B He","year":"2012","unstructured":"He D B, Padhye S, Chen J H. An efficient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 2012, 64(2): 1914\u20131926","journal-title":"Computers & Mathematics with Applications"},{"issue":"4","key":"3245_CR12","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1007\/s11704-013-2305-1","volume":"7","author":"H Sun","year":"2013","unstructured":"Sun H, Wen Q, Zhang H, Jin Z. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 2013, 7(4): 544\u2013557","journal-title":"Frontiers of Computer Science"},{"key":"3245_CR13","first-page":"291","volume":"1294","author":"Y Zheng","year":"1997","unstructured":"Zheng Y. Digital signcryption or how to achieve cost (signature and encryption) 6 cost (signature) + cost(encryption). Lecture Notes in Computer Science, 1997, 1294: 291\u2013312","journal-title":"Lecture Notes in Computer Science"},{"key":"3245_CR14","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume":"2332","author":"J H An","year":"2002","unstructured":"An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Lecture Notes in Computer Science, 2002, 2332: 83\u2013107.","journal-title":"Lecture Notes in Computer Science"},{"key":"3245_CR15","volume-title":"Identity based signcryption. Cryptologry ePrint Archive: Report","author":"J Malone-Lee","year":"2002","unstructured":"Malone-Lee J. Identity based signcryption. Cryptologry ePrint Archive: Report 2002\/098, http:\/\/eprint.iacr.org\/2002\/098"},{"key":"3245_CR16","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/1368310.1368364","volume-title":"Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security","author":"M Barbosa","year":"2008","unstructured":"Barbosa M, Farshim P. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 369\u2013372"},{"key":"3245_CR17","first-page":"661","volume-title":"Proceedings of the 2008 International Symposium on Information Science and Engieering","author":"C Wu","year":"2008","unstructured":"Wu C, Chen Z. A new efficient certificateless signcryption scheme. In: Proceedings of the 2008 International Symposium on Information Science and Engieering. 2008, 661\u2013664"},{"key":"3245_CR18","unstructured":"Selvi S S D, Vivek S S, Rangan U. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009\/298, http:\/\/eprint.iacr.org\/2009\/298"},{"key":"3245_CR19","doi-asserted-by":"crossref","unstructured":"Xie W, Zhang Z. Efficient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive: Report 2009\/578, http:\/\/eprmt.iacr.org\/2009\/578","DOI":"10.1109\/WCINS.2010.5541841"},{"key":"3245_CR20","unstructured":"Selvi S S D, Vivek S S, Ragan C P. Security weaknesses in two certificateless signcryption schemes. Cryptology ePrint Archive: Report 2010\/092. http:\/\/eprint.iacr.org\/2010\/092"},{"issue":"3","key":"3245_CR21","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","volume":"180","author":"Z Liu","year":"2010","unstructured":"Liu Z, Hu Y, Zhang X, Ma H. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452\u2013464","journal-title":"Information Sciences"},{"issue":"3","key":"3245_CR22","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.ins.2010.09.037","volume":"181","author":"J Weng","year":"2011","unstructured":"Weng J, Yao G, Deng R H, Chen M, Li X. Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 2011, 181(3): 661\u2013667","journal-title":"Information Sciences"},{"issue":"2","key":"3245_CR23","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Q Chen","year":"2007","unstructured":"Chen L Q, Cheng Z H, Smart N P. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, 6(2): 213\u2013241","journal-title":"International Journal of Information Security"},{"issue":"2","key":"3245_CR24","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao X, Kou W. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences, 2010, 180(2): 2895\u20132903","journal-title":"Information Sciences"},{"issue":"11\u201312","key":"3245_CR25","first-page":"657","volume":"66","author":"D B He","year":"2011","unstructured":"He D B, Chen Y T, Hu J. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications, 2011, 66(11\u201312): 657\u2013662","journal-title":"Annals of Telecommunications"},{"key":"3245_CR26","doi-asserted-by":"crossref","unstructured":"Barreto P, Deusajute A, Cruz E, Pereira G, Silva R. Toward efficient certificateless signcryption from (and without) bilinear pairings. http:\/\/sbseg2008.inf.ufrgs.br\/proceedings\/data\/pdf\/st03_03_artigo.pdf","DOI":"10.5753\/sbseg.2008.20892"},{"key":"3245_CR27","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-16342-5_6","volume":"6151","author":"S S D Selvi","year":"2010","unstructured":"Selvi S S D, Vivek S S, Ragan C P. Cryptanalysis of certificateless sign cryption schemes and an efficient construction without pairing. Lecture Notes in Computer Science, 2010, 6151: 75\u201392","journal-title":"Lecture Notes in Computer Science"},{"key":"3245_CR28","unstructured":"Xie W, Zhang Z. Certificateless signcryption without pairing. Cryptology ePrint Archive: Report 2010\/187, http:\/\/eprint.iacr.org\/2010\/187"},{"issue":"9","key":"3245_CR29","first-page":"1587","volume":"47","author":"H Zhu","year":"2010","unstructured":"Zhu H, Li H, Wang Y. Certificateless signcryption scheme without pairing. Journal of Computer Research and Development, 2010, 47(9): 1587\u20131594","journal-title":"Journal of Computer Research and Development"},{"issue":"8","key":"3245_CR30","doi-asserted-by":"crossref","first-page":"1918","DOI":"10.3724\/SP.J.1001.2011.03891","volume":"22","author":"W Liu","year":"2011","unstructured":"Liu W, Xu C. Certificateless signcryption scheme without bilinear pairing. Journal of Software, 2011, 22(8): 1918\u20131926","journal-title":"Journal of Software"},{"key":"3245_CR31","doi-asserted-by":"crossref","first-page":"4753","DOI":"10.1109\/EMEIT.2011.6024098","volume-title":"Proceedings of the 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","author":"X Jing","year":"2011","unstructured":"Jing X. Provably secure certificateless signcryption scheme without pairing. In: Proceedings of the 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. 2011, 4753\u20134756"},{"issue":"3","key":"3245_CR32","first-page":"618","volume":"24","author":"D B He","year":"2013","unstructured":"He D B. Security analysis of a certificateless signcryption scheme, Journal of Software (Chinese), 2013, 24(3): 618\u2013622","journal-title":"Journal of Software (Chinese)"},{"issue":"3","key":"3245_CR33","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"P David","year":"2000","unstructured":"David P, Jacque S. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361\u2013396","journal-title":"Journal of Cryptology"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3245-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-3245-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3245-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T08:10:53Z","timestamp":1689149453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-3245-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,21]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["3245"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-3245-0","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,21]]}}}