{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T12:33:17Z","timestamp":1719837197088},"reference-count":17,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2016,1]]},"abstract":"<jats:p> A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design cryptosystem with less pairing operations. Taken into account the computational costs, our scheme only requires 2 pairing operations in delegation and signing, respectively. <\/jats:p>","DOI":"10.1142\/s0129054116500064","type":"journal-article","created":{"date-parts":[[2016,3,17]],"date-time":"2016-03-17T22:57:55Z","timestamp":1458255475000},"page":"85-100","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Certificateless Proxy Signature Scheme"],"prefix":"10.1142","volume":"27","author":[{"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Science, Guizhou Normal University, Guiyang 550001, P. R. China"}]},{"given":"Jiwen","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Xiamen University, Fujian 361005, P. R. China"}]},{"given":"Huawei","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Guizhou Normal University, Guiyang 550001, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2016,3,17]]},"reference":[{"key":"p_1","first-page":"302","author":"Au M. H.","year":"2007","journal-title":"ACM"},{"key":"p_2","first-page":"452","volume":"2894","author":"Al-Riyami S. S.","journal-title":"LNCS"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.06.017"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.013"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.009"},{"key":"p_11","first-page":"308","volume":"4586","author":"Huang X.","journal-title":"LNCS"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2007.39"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1007\/s10986-005-0008-5"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.06.014"},{"key":"p_16","first-page":"47","volume":"196","author":"Shamir A.","journal-title":"LNCS"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.08.024"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.005"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.054"},{"key":"p_20","unstructured":"H. Q. Wang, Certificateless ring signature scheme from anonymous subsets. 2010 International Conference on Multimedia Information Networking and Security. pp. 413-417. DOI: 10.1109\/MINES.2010.92.10.1109\/MINES.2010.92"},{"key":"p_21","unstructured":"H. Q. Wang and S. J. Han, A provably secure threshold ring signature scheme in certificateless cryptography. 2010 International Conference of Information Science and Management Engineering. pp.105-108. DOI: 10.1109\/ISME.2010.113.10.1109\/ISME.2010.113"},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.08.008"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.015"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054116500064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T23:44:55Z","timestamp":1565135095000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054116500064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":17,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2016,3,17]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1142\/S0129054116500064"],"URL":"https:\/\/doi.org\/10.1142\/s0129054116500064","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}