{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:37:49Z","timestamp":1648589869499},"reference-count":2,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:p> Identity-based signcryption is a primitive that combines the functions of identity-based encryption and identity-based signature. In this paper, we first attack two of the existing identity-based signcryption schemes which are claimed to be provably secure without random oracles. Then we construct a new identity-based signcryption scheme and proves its security without random oracles. <\/jats:p>","DOI":"10.1142\/s0129054114500014","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T22:35:13Z","timestamp":1398724513000},"page":"1-23","source":"Crossref","is-referenced-by-count":1,"title":["A NEW CONSTRUCTION OF IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES"],"prefix":"10.1142","volume":"25","author":[{"given":"JIA","family":"FAN","sequence":"first","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu, Sichuan 610000, P. R. China"}]},{"given":"YULIANG","family":"ZHENG","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, North Carolina 28223, USA"}]},{"given":"XIAOHU","family":"TANG","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University, Chengdu, Sichuan 610031, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2014,4,28]]},"reference":[{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.014"},{"issue":"6","key":"p_17","first-page":"1923","volume":"6","author":"Zhang Bo","year":"2010","journal-title":"Journal of Computational Information Systems"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054114500014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T14:46:03Z","timestamp":1565102763000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054114500014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":2,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2014,4,28]]},"published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1142\/S0129054114500014"],"URL":"https:\/\/doi.org\/10.1142\/s0129054114500014","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}