{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:36:25Z","timestamp":1761676585078},"reference-count":20,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T00:00:00Z","timestamp":1510185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx104","type":"journal-article","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:09:17Z","timestamp":1507705757000},"page":"539-544","source":"Crossref","is-referenced-by-count":10,"title":["Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme"],"prefix":"10.1093","volume":"61","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, PR China"}]},{"given":"Lin","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, Qingdao University, Qingdao 266071, PR China"}]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, PR China"}]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, PR China"}]}],"member":"286","published-online":{"date-parts":[[2017,11,9]]},"reference":[{"key":"key\n\t\t\t\t20180329074333_bxx104C1","author":"Shamir","year":"1984"},{"key":"key\n\t\t\t\t20180329074333_bxx104C2","author":"Al-Riyami","year":"2003"},{"key":"key\n\t\t\t\t20180329074333_bxx104C17","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.ins.2013.01.013","article-title":"Provably secure certificate-based signature scheme without pairings","volume":"233","author":"Li","year":"2013","journal-title":"Inf. Sci. (NY)."},{"key":"key\n\t\t\t\t20180329074333_bxx104C18","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1016\/j.camwa.2012.01.006","article-title":"Certificate-based signcryption with enhanced security features","volume":"64","author":"Li","year":"2012","journal-title":"Comput. Math. Appl."},{"key":"key\n\t\t\t\t20180329074333_bxx104C19","first-page":"2554","article-title":"Provably secure certificate-based signcryption scheme without pairings","volume":"8","author":"Lu","year":"2014","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"key\n\t\t\t\t20180329074333_bxx104C3","author":"Zheng","year":"1997"},{"key":"key\n\t\t\t\t20180329074333_bxx104C4","author":"Barbosa","year":"2008"},{"key":"key\n\t\t\t\t20180329074333_bxx104C5","first-page":"10","article-title":"Cryptanalysis and improvement of an efficient certificateless signature scheme","volume":"10","author":"Wu","year":"2012","journal-title":"J. Commun. Netw."},{"key":"key\n\t\t\t\t20180329074333_bxx104C6","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.3837\/tiis.2013.08.013","article-title":"Provably secure forward secure certificateless proxy signature scheme","volume":"7","author":"Li","year":"2013","journal-title":"Ksii Trans. Internet Inf. Syst."},{"key":"key\n\t\t\t\t20180329074333_bxx104C7","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.tcs.2016.05.019","article-title":"Provably secure certificateless proxy signature scheme in the standard model","volume":"639","author":"Lu","year":"2016","journal-title":"Theor. Comput. Sci."},{"key":"key\n\t\t\t\t20180329074333_bxx104C8","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1007\/s11277-016-3327-4","article-title":"Practical signcryption for secure communication of wireless sensor networks","volume":"89","author":"Li","year":"2016","journal-title":"Wireless Personal Commun."},{"key":"key\n\t\t\t\t20180329074333_bxx104C9","volume-title":"Generic Construction of Certificateless Signcryption Scheme. Information Systems Security","author":"Kar","year":"2016"},{"key":"key\n\t\t\t\t20180329074333_bxx104C10","author":"Nguyen","year":"2015"},{"key":"key\n\t\t\t\t20180329074333_bxx104C11","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1002\/sec.1146","article-title":"Certificateless online\/offline signcryption scheme","volume":"8","author":"Li","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180329074333_bxx104C12","first-page":"597","article-title":"An improved certificateless signcryption in the standard model","volume":"17","author":"Cheng","year":"2015","journal-title":"Int. J. Netw. Secur."},{"key":"key\n\t\t\t\t20180329074333_bxx104C13","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1007\/s11277-014-2070-y","article-title":"Certificateless hybrid signcryption scheme for secure communication of wireless sensor networks","volume":"80","author":"Yin","year":"2015","journal-title":"Wireless Personal Commun."},{"key":"key\n\t\t\t\t20180329074333_bxx104C14","first-page":"1979","article-title":"Certificateless online\/offline signcryption for the internet of things","volume":"8","author":"Li","year":"2015","journal-title":"Wireless Netw."},{"key":"key\n\t\t\t\t20180329074333_bxx104C15","first-page":"16","article-title":"A signcryption scheme from certificateless to identity-based environment for wsns into iot","volume":"120","author":"Klugahbrown","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"key\n\t\t\t\t20180329074333_bxx104C16","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1007\/s11277-015-2864-6","article-title":"On security of a certificateless hybrid signcryption scheme","volume":"85","author":"Yin","year":"2015","journal-title":"Wireless Personal Commun."},{"key":"key\n\t\t\t\t20180329074333_bxx104C20","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1093\/comjnl\/bxx005","article-title":"Pairing-free and secure certificateless signcryption scheme","volume":"60","author":"Yu","year":"2017","journal-title":"Comput. J."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/539\/24509681\/bxx104.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T07:43:43Z","timestamp":1522309423000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/539\/4608880"}},"subtitle":[],"editor":[{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,11,9]]},"references-count":20,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,11,9]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx104","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,11,9]]}}}