{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:00:18Z","timestamp":1729670418912,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fskd.2015.7382229","type":"proceedings-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T23:52:33Z","timestamp":1452815553000},"page":"1852-1857","source":"Crossref","is-referenced-by-count":1,"title":["An efficient revocable certificateless signature scheme"],"prefix":"10.1109","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"family":"Xubing Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"134","article-title":"Efficien t revocation and thres-hold pairing based cryptosystems","author":"libert","year":"2003","journal-title":"Symposium on Principles of Distributed Computing-PODC 2003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.036"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based Encryption from the Weil Pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"CRYPTO 2001 LNCS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref14","first-page":"412","article-title":"Revocable certificateless public key encryption","author":"tsai","year":"2013","journal-title":"IEEE Systems Journal"},{"key":"ref15","first-page":"16","article-title":"Secure Certifi-cateless Signature with Revocation in the Standard Model, Mathematical Problems","volume":"2014","author":"tsai","year":"0","journal-title":"Engineering"},{"key":"ref16","first-page":"216","article-title":"Revocable identity-based encryption revisited: security model and construction","author":"seo","year":"2013","journal-title":"PKC 2013 LNCS 7778"},{"key":"ref17","first-page":"475","volume":"55","author":"tseng","year":"2012","journal-title":"Efficient revocable ID-based encryption with a public channel Computer Journal"},{"key":"ref18","article-title":"On the Security of a Public Auditing Mechanism for Shared Cloud Data Service","author":"yu","year":"0","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1093\/comjnl\/bxr097","article-title":"Certficate-less Signatures: New Scheomes and Security Models","volume":"55","author":"xinyi","year":"2012","journal-title":"The Computer Journal"},{"key":"ref3","first-page":"13","article-title":"On the Security of Certificateless Sig nature Schemes from Asiacrypt 2003","author":"huang","year":"2005","journal-title":"CANS 2005 LNCS 3810"},{"key":"ref6","first-page":"322","article-title":"An efficient certificate less signatures scheme","author":"yap","year":"0","journal-title":"E U C workshops 2006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24707-4_93"},{"key":"ref8","first-page":"89","article-title":"Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model","author":"liu","year":"2007","journal-title":"2007 ACM Symposium on Information Computer and Communications SecurityIASIACCS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.149"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificate less Public Key Cryptography","author":"al riyami","year":"2003","journal-title":"Advances in Cryptology - CRYPTO 2003"},{"key":"ref1","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"CRYPTO 1984 LNCS"},{"key":"ref9","first-page":"135","article-title":"A Schnorr-Like Lightweight Identity-Based Signature Scheme","author":"galindo","year":"2009","journal-title":"AFRICACRYPT 2009 5580 of LNCS"},{"key":"ref20","first-page":"598","article-title":"Provable Data Possession at Untrusted Stores","author":"ateniese","year":"2007","journal-title":"CCS2007"},{"key":"ref22","first-page":"200","article-title":"Improved multi-proxy signature scheme without random oracles","volume":"20","author":"sun","year":"2011","journal-title":"CJE"},{"key":"ref21","first-page":"584","author":"juels","year":"2007","journal-title":"Proofs of Retrievability for Large Files CCS'07"}],"event":{"name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7374053\/7381900\/07382229.pdf?arnumber=7382229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T23:47:03Z","timestamp":1498261623000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7382229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/fskd.2015.7382229","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}