{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T16:51:50Z","timestamp":1772902310946,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11704-015-5138-2","type":"journal-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T11:39:40Z","timestamp":1449574780000},"page":"741-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Identity-based aggregate signcryption in the standard model from multilinear maps"],"prefix":"10.1007","volume":"10","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"5138_CR1","first-page":"165","volume-title":"In: Proceedings of the 17th Annual International Cryptology Conference","author":"Y L Zheng","year":"1997","unstructured":"Zheng Y L. Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption). In: Proceedings of the 17th Annual International Cryptology Conference. 1997, 165\u2013179"},{"key":"5138_CR2","first-page":"80","volume-title":"In: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems","author":"J Baek","year":"2002","unstructured":"Baek J, Steinfeld R, Zheng Y L. Formal proofs for the security of signcryption. In: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems. 2002, 80\u201398"},{"issue":"5","key":"5138_CR3","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","volume":"68","author":"Y L Zheng","year":"1998","unstructured":"Zheng Y L, Imai H. How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, 1998, 68(5): 227\u2013233","journal-title":"Information Processing Letters"},{"key":"5138_CR4","first-page":"55","volume-title":"In: Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography","author":"F Bao","year":"1998","unstructured":"Bao F, Deng R H. A signcryption scheme with signature directly verifiable by public key. In: Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography. 1998, 55\u201359"},{"issue":"2","key":"5138_CR5","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.amc.2004.06.124","volume":"167","author":"R S Hwang","year":"2005","unstructured":"Hwang R S, Lai C H, Su F F. An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation, 2005, 167(2): 870\u2013881","journal-title":"Applied Mathematics and Computation"},{"key":"5138_CR6","first-page":"47","volume-title":"In: Proceedings of CRYPTO","author":"A Shamir","year":"1984","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 47\u201353"},{"key":"5138_CR7","first-page":"98","volume-title":"IACR Cryptology ePrint Archive","author":"J Malone-Lee","year":"2002","unstructured":"Malone-Lee J. Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98"},{"key":"5138_CR8","first-page":"23","volume-title":"IACR Cryptology ePrint Archive","author":"B Libert","year":"2003","unstructured":"Libert B, Quisquater J J. New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive, 2003, 23"},{"key":"5138_CR9","first-page":"352","volume-title":"In: Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC 2003)","author":"S S M Chow","year":"2003","unstructured":"Chow S S M, Yiu S M, Hui L C K, Chow K P. Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC 2003). 2003, 352\u2013369"},{"key":"5138_CR10","first-page":"383","volume-title":"In: Proceedings of the 23rd Annual International Cryptology Conference","author":"X Boyen","year":"2003","unstructured":"Boyen X. Multipurpose identity-based signcryption. In: Proceedings of the 23rd Annual International Cryptology Conference. 2003, 383\u2013399"},{"key":"5138_CR11","first-page":"362","volume-title":"In: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography","author":"L Q Chen","year":"2005","unstructured":"Chen L Q, Malone-Lee J. Improved identity-based signcryption. In: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. 2005, 362\u2013379"},{"key":"5138_CR12","first-page":"515","volume-title":"In: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security","author":"P S L M Barreto","year":"2005","unstructured":"Barreto P S L M, Libert B, McCullagh N, Quisquater J J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security. 2005, 515\u2013532"},{"key":"5138_CR13","first-page":"378","volume-title":"In: Proceedings of the 10th International Conference on Cryptology in India","author":"S S D Selvi","year":"2009","unstructured":"Selvi S S D, Vivek S S, Shriram J, Kalaivani S, Rangan C P. Identity based aggregate signcryption schemes. In: Proceedings of the 10th International Conference on Cryptology in India. 2009, 378\u2013397"},{"issue":"3","key":"5138_CR14","doi-asserted-by":"crossref","first-page":"421","DOI":"10.4218\/etrij.12.0111.0215","volume":"34","author":"X Y Ren","year":"2012","unstructured":"Ren X Y, Qi Z H, Geng Y. Provably secure aggregate signcryption scheme. ETRI Journal, 2012, 34(3): 421\u2013428","journal-title":"ETRI Journal"},{"issue":"11","key":"5138_CR15","first-page":"107","volume":"9","author":"Z H Qi","year":"2012","unstructured":"Qi Z H, Ren X Y, Geng Y. Provably secure general aggregate signcryption scheme in the random oracle modele. China Communications, 2012, 9(11): 107\u2013116","journal-title":"China Communications"},{"key":"5138_CR16","first-page":"37","volume-title":"IACR Cryptology ePrint Archive","author":"J Kar","year":"2013","unstructured":"Kar J. Provably secure identity-based aggregate signcryption scheme in random oracles. IACR Cryptology ePrint Archive, 2013, 37"},{"key":"5138_CR17","first-page":"200","volume-title":"IACR Cryptology ePrint Archive","author":"A W Dent","year":"2012","unstructured":"Dent A W. Aggregate signcryption. IACR Cryptology ePrint Archive, 2012, 200"},{"key":"5138_CR18","first-page":"360","volume-title":"IACR Cryptology ePrint Archive","author":"Z Eslami","year":"2011","unstructured":"Eslami Z, Pakniat N. Certificateless aggregate signcryption schemes. IACR Cryptology ePrint Archive, 2011, 360"},{"key":"5138_CR19","first-page":"132","volume-title":"In: Proceedings of 2011 International Conference on Electronics, Communications and Control (ICECC-2011)","author":"H J Lu","year":"2011","unstructured":"Lu H J, Xie Q. An efficient certificateless aggregate signcryption scheme from pairings. In: Proceedings of 2011 International Conference on Electronics, Communications and Control (ICECC-2011). 2011, 132\u2013135"},{"issue":"4","key":"5138_CR20","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited. Journal of the ACM, 2004, 51(4): 557\u2013594","journal-title":"Journal of the ACM"},{"key":"5138_CR21","first-page":"494","volume-title":"In: Proceedings of the 33rd Annual Cryptology Conference, Part I","author":"S Hohenberger","year":"2013","unstructured":"Hohenberger S, Sahai A, Waters B. Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Proceedings of the 33rd Annual Cryptology Conference, Part I. 2013, 494\u2013512"},{"issue":"1","key":"5138_CR22","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2003","unstructured":"Boneh D, Silverberg A. Applications of multilinear forms to cryptography. Contemporary Mathematics, 2003, 324(1): 71\u201390","journal-title":"Contemporary Mathematics"},{"key":"5138_CR23","first-page":"1","volume-title":"In: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"S Garg","year":"2013","unstructured":"Garg S, Gentry C, Halevi S. Candidate multilinear maps from ideal lattices. In: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013, 1\u201317"},{"key":"5138_CR24","first-page":"513","volume-title":"In: Proceedings of the 33rd Annual Cryptology Conference, Part I","author":"E S V Freire","year":"2013","unstructured":"Freire E S V, Hofheinz D, Paterson K G, Striecks C. Programmable hash functions in the multilinear setting. In: Proceedings of the 33rd Annual Cryptology Conference, Part I. 2013, 513\u2013530"},{"issue":"2","key":"5138_CR25","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1504\/IJHPCN.2015.070012","volume":"8","author":"H Wang","year":"2015","unstructured":"Wang H, Zheng Z H, Yang B. New identity-based key-encapsulation mechanism and its applications in cloud computing. International Journal of High Performance Computing and Networking, 2015, 8(2): 124\u2013134","journal-title":"International Journal of High Performance Computing and Networking"},{"key":"5138_CR26","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"In: Proceedings of the 3rd Intemational Symposium on Algorithmic Number Theory (ANTS-III)","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem. In: Proceedings of the 3rd Intemational Symposium on Algorithmic Number Theory (ANTS-III). 1998, 267\u2013288"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-015-5138-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-015-5138-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-015-5138-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:01:23Z","timestamp":1559408483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-015-5138-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["5138"],"URL":"https:\/\/doi.org\/10.1007\/s11704-015-5138-2","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,7]]}}}