{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T05:02:29Z","timestamp":1746594149701,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/iwcmc51323.2021.9498776","type":"proceedings-article","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:27:05Z","timestamp":1628548025000},"page":"626-631","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Identity-based Forward Secure Signature Scheme from Lattices"],"prefix":"10.1109","author":[{"given":"Guang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ruwei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"ajtai","year":"0","journal-title":"Proc STOC'96"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref16","first-page":"135","article-title":"Two remarks on public key cryptology (invited lecture)","author":"anderson","year":"1997","journal-title":"Proceedings of the 1997 ACM conference on computer and communications security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2011-562"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.03.011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.808397"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_20"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11432-007-0038-1","article-title":"Identity-based signature scheme based on quadratic residues","volume":"50","author":"cao","year":"2007","journal-title":"Sci China Ser F Inform Sci"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/11593447_28","article-title":"Efficient and provably-secure identity-based signatures and signcryption from bilinear maps","volume":"3788","author":"barreto","year":"2005","journal-title":"Advances in Cryptology - ASIACRYPT 2005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.04.013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.01.006"},{"key":"ref2","first-page":"47","article-title":"Identity-based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"Proceedings of Advances in Crypto'84"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.220"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.12.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705447360"},{"key":"ref23","first-page":"98","article-title":"Lattice basis delegation in fixed dimension and shorter-cipertext hierarchical IBE","author":"agrawal","year":"2010","journal-title":"Advances Cryptology CRYPTO'99"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2013.058658"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-010-9278-3"}],"event":{"name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2021,6,28]]},"location":"Harbin City, China","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9497780\/9498576\/09498776.pdf?arnumber=9498776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:23Z","timestamp":1652197703000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9498776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwcmc51323.2021.9498776","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}