{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:53:09Z","timestamp":1761007989828,"version":"build-2065373602"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/jcn.2008.6388324","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T16:25:47Z","timestamp":1377879947000},"page":"18-27","source":"Crossref","is-referenced-by-count":4,"title":["Many-to-one encryption and authentication scheme and its application"],"prefix":"10.23919","volume":"10","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, and Graduate School of Chinese Academy of Sciences, Beijing"}]},{"given":"Chuan-Kun","family":"Wu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, and Graduate School of Chinese Academy of Sciences, Beijing"}]}],"member":"263","reference":[{"key":"ref10","first-page":"452","article-title":"Certificateless public key cryptogra-phy","author":"al-riyami","year":"2003","journal-title":"Proceedings of Asiacrypt 03 LNCS 2894"},{"key":"ref11","first-page":"41","article-title":"Revocation and tracing schemes for stateless receivers","author":"naor","year":"2001","journal-title":"Crypto'01 LNCS 2139"},{"key":"ref12","article-title":"Efficient certificate revocation","author":"micali","year":"1996","journal-title":"MIT Laboratory for Computer Science Tech Rep"},{"key":"ref13","article-title":"Novomodo: Scalable certificate validation and simplified PKI management","author":"micali","year":"2002","journal-title":"1st Annual PKI Research Workshop"},{"key":"ref14","first-page":"195","article-title":"Evidence that XTR is more secure than supersingular elliptic curve cryptosystems","author":"verheul","year":"2001","journal-title":"Proc EUROCRYPT 2001 LNCS 2045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"ref16","first-page":"385","article-title":"A one round protocol for tripartite Diffie-Hellman","author":"joux","year":"2000","journal-title":"Proc ANTS IV LNCS 1838"},{"key":"ref17","first-page":"481","article-title":"A new traitor tracing","volume":"e85 a","author":"mitsunari","year":"2002","journal-title":"IEICE Trans"},{"key":"ref18","first-page":"61","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","author":"camenisch","year":"2002","journal-title":"Crypto 2002 LNCS 2442"},{"key":"ref19","first-page":"480","article-title":"Collision-free accumulators and fail-stop signature schemes without trees","author":"baric","year":"1997","journal-title":"EUROCRYPT '97 LNCS 1233"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_57"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941293"},{"key":"ref6","first-page":"432","article-title":"Many-to-one algorithms and group signatures","author":"wu","year":"1999","journal-title":"Proc ACSC'99"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0023305"},{"key":"ref8","first-page":"272","article-title":"Certificate-based encryption and the certificate revocation problem","author":"gentry","year":"2003","journal-title":"Proc of Eurocrypt 2003 LNCS 2656"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/49.223873"},{"key":"ref1","first-page":"120","article-title":"Society and group oriented cryptography: A new concept","author":"desmedt","year":"1988","journal-title":"Proc CRYPTO'87 LNCS 293"},{"article-title":"Cryptographic schemes based on elliptic curve pairings","year":"2004","author":"al-riyami","key":"ref9"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6388318\/06388324.pdf?arnumber=6388324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:57Z","timestamp":1760982957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6388324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2008.6388324","relation":{},"ISSN":["1976-5541","1229-2370"],"issn-type":[{"type":"electronic","value":"1976-5541"},{"type":"print","value":"1229-2370"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}