{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T13:17:18Z","timestamp":1723209438980},"reference-count":16,"publisher":"EDP Sciences","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["RAIRO-Theor. Inf. Appl."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1051\/ita\/2016013","type":"journal-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T13:15:56Z","timestamp":1463750156000},"page":"307-318","source":"Crossref","is-referenced-by-count":2,"title":["Certificateless ring signature based on RSA problem and DL problem"],"prefix":"10.1051","volume":"49","author":[{"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2016,5,20]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","unstructured":"S.S. Al-Riyami and K.G. Paterson, Certificateless public cryptography. In: Advances in Cryptology-Asiacrypt, edited by C.S. Laih. Vol. 2894 ofLect. Notes Comput. Sci.(2003) 452\u2013473.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"R2","unstructured":"Bender A., Katz J. and Morselli R., Ring signatures: stronger definitions, and constructions without random Oracles.J. Cryptology22(2009) 114\u2013138."},{"key":"R3","unstructured":"Chang S., Wong D.S., Mu Y. and Zhang Z.F., Certificateless threshold ring signature.Inf. Sci.179(2009) 3685\u20133696."},{"key":"R4","unstructured":"S.S.M. Chow and W.S. Yap, Certificateless ring signature.Cryptology ePrinArchive: Report 2007\/236. Available at http:\/\/eprint.iacr.org\/2007\/236"},{"key":"R5","doi-asserted-by":"crossref","unstructured":"S.S.M. Chow, S.M. Yiu and L.C.K. Hui, Efficient identity based ring signature. ACNS\u201905, Vol. 3531 ofLect. Notes Comput. Sci.499\u2013512.","DOI":"10.1007\/11496137_34"},{"key":"R6","unstructured":"Cao X. and Kou W., A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges.Inf. Sci.180(2010) 2895\u20132903."},{"key":"R7","unstructured":"Dong X.D. and Lu H.M., An Improved RSA-Based Certificateless Signature Scheme.Appl. Mech. Mater.687(2014) 2165\u20132168."},{"key":"R8","unstructured":"Herranz J., Identity-based ring signatures from RSA.Theoret. Comput. Sci.389(2007) 100\u2013117."},{"key":"R9","doi-asserted-by":"crossref","unstructured":"J. Herranz and G. Saez, New identity-based ring signature schemes.ICICS. Vol. 3269 ofLect. Notes Comput. Sci.(2004) 27\u201339.","DOI":"10.1007\/978-3-540-30191-2_3"},{"key":"R10","doi-asserted-by":"crossref","unstructured":"L. Nguyen, Accumulators from bilinear pairings and applications.CT-RSA(2005) 275\u2013292.","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"R11","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, A. Shamir and Y. Tauman, How to leak a secret.ASIACRYPT\u201901. Vol. 2248 ofLect. Notes Comput. Sci.(2001) 552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"R12","unstructured":"A. Shamir, Identity-based cryptosystem and signature scheme. In: Advances in Cryptology-Crypto. Vol. 196 ofLect. Notes Comput. Sci.(1984) 47\u201353."},{"key":"R13","doi-asserted-by":"crossref","unstructured":"H.Q. Wang, Certificateless ring signature scheme from anonymous subsets.International Conference on Multimedia Information Networking and Security(2010) 413\u2013417.","DOI":"10.1109\/MINES.2010.92"},{"key":"R14","unstructured":"Yuen T.H., Liu J.K., Au M.H., Susilo W. and Zhou J., Efficient linkable and\/or threshold ring signature without random oracles.Comput. J.56(2013) 407\u2013421."},{"key":"R15","doi-asserted-by":"crossref","unstructured":"Zhang J. and Mao J., An efficient RSA-based certificateless signature scheme.J. Systems Software85(2012) 638\u2013642.","DOI":"10.1016\/j.jss.2011.09.036"},{"key":"R16","doi-asserted-by":"crossref","unstructured":"L. Zhang, F. Zhuang and W. Wu, A provably secure ring signature scheme in certificateless cryptography. In:Proc. of the Provsec. Vol. 4784 ofLect. Notes Comput. Sci.(2007) 103\u2013121.","DOI":"10.1007\/978-3-540-75670-5_7"}],"container-title":["RAIRO - Theoretical Informatics and Applications"],"original-title":[],"link":[{"URL":"http:\/\/www.rairo-ita.org\/10.1051\/ita\/2016013\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T04:09:07Z","timestamp":1567915747000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rairo-ita.org\/10.1051\/ita\/2016013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":16,"journal-issue":{"issue":"4"},"alternative-id":["ita150046"],"URL":"https:\/\/doi.org\/10.1051\/ita\/2016013","relation":{},"ISSN":["0988-3754","1290-385X"],"issn-type":[{"value":"0988-3754","type":"print"},{"value":"1290-385X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}