{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:18:09Z","timestamp":1649063889810},"reference-count":28,"publisher":"Elsevier BV","issue":"14","license":[{"start":{"date-parts":[[1997,12,1]],"date-time":"1997-12-01T00:00:00Z","timestamp":880934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1997,12]]},"DOI":"10.1016\/s0140-3664(97)00106-0","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"1301-1307","source":"Crossref","is-referenced-by-count":1,"title":["Three ID-based information security functions"],"prefix":"10.1016","volume":"20","author":[{"given":"Wei-Bin","family":"Lee","sequence":"first","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(97)00106-0_BIB1","first-page":"472","article-title":"New Directions in Cryptography","volume":"52","author":"Diffie","year":"1976"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB2","doi-asserted-by":"crossref","unstructured":"A. Shamir, Identity-based cryptosystem and signature schemes, Advances in Cryptology \u2014 Crypto '84, Springer-Verlag, New York, pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB3","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1049\/el:19870912","article-title":"ID-based cryptosystem using discrete logarithm problem","volume":"23","author":"Tsujii","year":"1987","journal-title":"Electron. Lett."},{"issue":"14","key":"10.1016\/S0140-3664(97)00106-0_BIB4","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1049\/el:19880584","article-title":"Modified ID-based cryptosystem using discrete logarithm problem","volume":"24","author":"Laih","year":"1988","journal-title":"Electron. Lett."},{"issue":"1","key":"10.1016\/S0140-3664(97)00106-0_BIB5","doi-asserted-by":"crossref","first-page":"7778","DOI":"10.1049\/el:19890055","article-title":"Comment: modified ID-based cryptosystem using discrete logarithm problem","volume":"25","author":"Tsujii","year":"1989","journal-title":"Electron. Lett."},{"key":"10.1016\/S0140-3664(97)00106-0_BIB6","series-title":"Advances in Cryptology \u2014 Eurocrypt '91","first-page":"498","article-title":"Non-interactive public key cryptography","author":"Maurer","year":"1991"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB7","series-title":"Advances in Cryptology \u2014 Eurocrypt '89","first-page":"29","article-title":"An identity-based key exchange protocol","author":"G\u00fcnther","year":"1989"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB8","series-title":"Advances in Cryptology \u2014 Crypto '87","first-page":"185","article-title":"On the key predistribution system","author":"Matsumoto","year":"1988"},{"issue":"3","key":"10.1016\/S0140-3664(97)00106-0_BIB9","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/BF00129771","article-title":"A non-interactive public-key distribution system","volume":"9","author":"Maurer","year":"1996","journal-title":"Designs, Codes Cryptography"},{"issue":"2","key":"10.1016\/S0140-3664(97)00106-0_BIB10","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/49.17700","article-title":"Identity-based information security management for personal computer networks","volume":"7","author":"Okamoto","year":"1989","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"4","key":"10.1016\/S0140-3664(97)00106-0_BIB11","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/49.17711","article-title":"Key distribution system based on identification information","volume":"7","author":"Okamoto","year":"1989","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/S0140-3664(97)00106-0_BIB12","series-title":"Advances in Cryptology \u2014 Crypto '91","first-page":"6.18","article-title":"An new ID-based key sharing system","author":"Tsujii","year":"1991"},{"issue":"5","key":"10.1016\/S0140-3664(97)00106-0_BIB13","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/49.223874","article-title":"A simple ID-based for key sharing","volume":"11","author":"Tsujii","year":"1993","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"4","key":"10.1016\/S0140-3664(97)00106-0_BIB14","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1109\/49.17709","article-title":"An ID-based cryptosystem based on the discrete logarithm problem","volume":"7","author":"Tsujii","year":"1989","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/S0140-3664(97)00106-0_BIB15","first-page":"308","article-title":"On the Risk of Opening Distributed Keys","volume":"vol. 839","author":"Burmester","year":"1994"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB16","series-title":"Advances in Cryptology \u2014 Eurocrypt '92","first-page":"458","article-title":"A remark on a non-interactive public key distribution system","author":"Maurer","year":"1992"},{"issue":"2","key":"10.1016\/S0140-3664(97)00106-0_BIB17","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0020-0190(92)90016-O","article-title":"Attack on Okamoto and Tanaka's one-way ID-based key distribution","volume":"43","author":"Hwang","year":"1992","journal-title":"Inf. Processing Lett."},{"issue":"10","key":"10.1016\/S0140-3664(97)00106-0_BIB18","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1049\/el:19900436","article-title":"ID-based public key cryptosystems based on Okamoto and Tanaka's ID-based one way communication scheme","volume":"26","author":"Tsai","year":"1990","journal-title":"Electron. Lett."},{"issue":"5","key":"10.1016\/S0140-3664(97)00106-0_BIB19","first-page":"757","article-title":"ID-based cryptographic schemes for user identification, digital signature, and key distribution","volume":"1","author":"Ham","year":"1993","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"2","key":"10.1016\/S0140-3664(97)00106-0_BIB20","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1049\/el:19880076","article-title":"Efficient identification and signature schemes","volume":"24","author":"Ohta","year":"1988","journal-title":"Electron. Lett."},{"key":"10.1016\/S0140-3664(97)00106-0_BIB21","series-title":"Elementary Number Theory and its Application","author":"Rosen","year":"1988"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB22","article-title":"The Art of Computer Programming","volume":"vol. 2","author":"Knuth","year":"1987"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB23","unstructured":"K. Nyberg, R.A. Rueppel, Message recovery for signature schemes"},{"issue":"19","key":"10.1016\/S0140-3664(97)00106-0_BIB24","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1049\/el:19951167","article-title":"Authenticated encryption scheme without using a one-way function","volume":"1","author":"Lee","year":"1995","journal-title":"Electron. Lett."},{"key":"10.1016\/S0140-3664(97)00106-0_BIB25","article-title":"Digitalized Signatures and Public Key Functions as Intractable as Factorization","author":"Rabin","year":"1979","journal-title":"MIT\/LCS\/TR-212"},{"issue":"2","key":"10.1016\/S0140-3664(97)00106-0_BIB26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystem","volume":"21","author":"Rivest","year":"1987","journal-title":"Commun. ACM"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB27","first-page":"249","article-title":"Enhancing the security of ElGamals signature scheme","volume":"141","author":"He","year":"1994"},{"key":"10.1016\/S0140-3664(97)00106-0_BIB28","article-title":"Secure Hash Standard (SHS)","author":"National Institute of Standards Technology (NIST)","year":"1993","journal-title":"FIPS Publication 180"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497001060?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497001060?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T05:55:14Z","timestamp":1580882114000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366497001060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,12]]},"references-count":28,"journal-issue":{"issue":"14","published-print":{"date-parts":[[1997,12]]}},"alternative-id":["S0140366497001060"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(97)00106-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1997,12]]}}}