{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:23:04Z","timestamp":1730272984949,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,9]]},"DOI":"10.1109\/iscisc51277.2020.9261917","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:02:15Z","timestamp":1606176135000},"page":"95-100","source":"Crossref","is-referenced-by-count":1,"title":["On the Security of Some Recently Proposed Certificateless Signcryption Schemes"],"prefix":"10.1109","author":[{"given":"Parvin","family":"Rastegari","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.045"},{"key":"ref11","first-page":"3","article-title":"An Efficient Certificateless Signcryption Scheme in the Standard Model","volume":"9","author":"rastegari","year":"2017","journal-title":"ISC International Journal of Information Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC48546.2019.8985158"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz041"},{"key":"ref14","article-title":"Security Weaknesses in Two Certificateless Signcryption Schemes","author":"selvi","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref15","first-page":"47","article-title":"Identity-Based Cryptosystem and Signature Scheme","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology Proc Crypto'84"},{"key":"ref16","first-page":"9","article-title":"An Efficient Certificateless Signcryption Scheme without Random Oracles","volume":"11","author":"shan","year":"2019","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/sym11111386"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.037"},{"key":"ref19","article-title":"Toward Certificateless Signcryption Scheme Without Random Oracles","author":"xiong","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/cje.2018.06.002","article-title":"Certificateless Signcryption Scheme without Random Oracles","volume":"27","author":"caixue","year":"2018","journal-title":"Chinese Journal of Electronics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref6","article-title":"A Supplement to Liu et al.&#x2019;s Sertificateless Signcryption Scheme in the Standard Model","author":"jin","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref5","first-page":"597","article-title":"An Improved Certificateless Signcryption in the Standard Model","volume":"17","author":"cheng","year":"2015","journal-title":"IJ Network Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.10.011"},{"key":"ref7","article-title":"On the Security of A Certificateless Signcryption with Known Session-specific Temporary Information Security in the Standard Model","author":"lin","year":"2019","journal-title":"The Computer Journal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368364"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificateless Public Key Cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"ASIACRYPT 2003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4995-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07031-9"},{"key":"ref22","first-page":"199","article-title":"An Efficient Certificateless Signcryption in the Standard Model","author":"zheng","year":"2016","journal-title":"Cloud Computing and Big Data Analysis (ICCCBDA) IEEE International Conference on"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","article-title":"Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)","author":"zheng","year":"1997","journal-title":"Advances in Cryptology CRYPTO 97"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3554-8"}],"event":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2020,9,9]]},"location":"Tehran, Iran","end":{"date-parts":[[2020,9,10]]}},"container-title":["2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9261900\/9261901\/09261917.pdf?arnumber=9261917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:35Z","timestamp":1656453275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9261917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscisc51277.2020.9261917","relation":{},"subject":[],"published":{"date-parts":[[2020,9,9]]}}}