{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:31Z","timestamp":1762005031605,"version":"3.37.3"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"DOI":"10.13039\/501100001809","name":"the National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61462048"],"award-info":[{"award-number":["61462048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61362032"],"award-info":[{"award-number":["61362032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2018,9]]},"abstract":"<jats:p> Generalized ring signcryption (GRSC) can realize ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system with a large number of users, or whose function may be changed, or with limited storage space. We give a formal definition and security model of GRSC in the certificate-based cryptosystem setting and propose a concrete scheme by using bilinear pairings. The confidentiality of our scheme can be proved under the GBDH and CDH assumptions and the unforgeability of our scheme can be proved under [Formula: see text] and CDH assumptions in the random oracle model, and what is more, our scheme has unconditional anonymity. Compared with other certificateless ring signcryption schemes that use bilinear pairings, it is a highly efficient one. <\/jats:p>","DOI":"10.1142\/s0129054118500211","type":"journal-article","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T04:02:35Z","timestamp":1538712155000},"page":"1063-1088","source":"Crossref","is-referenced-by-count":9,"title":["Certificate-Based Generalized Ring Signcryption Scheme"],"prefix":"10.1142","volume":"29","author":[{"given":"Caixue","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Jiujiang University, 551 Qianjin Donglu, Jiujiang 332005, China"}]},{"given":"Guangyong","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Jiujiang University, 551 Qianjin Donglu, Jiujiang 332005, China"}]},{"given":"Zongmin","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Jiujiang University, 551 Qianjin Donglu, Jiujiang 332005, China"}]},{"given":"Zhiqiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Jiujiang University, 551 Qianjin Donglu, Jiujiang 332005, China"}]}],"member":"219","published-online":{"date-parts":[[2018,10,5]]},"reference":[{"key":"S0129054118500211BIB001","series-title":"LNCS","first-page":"47","volume-title":"Advances in Cryptology \u2014 CRYPTO","volume":"196","author":"Shamir A.","year":"1984"},{"key":"S0129054118500211BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"S0129054118500211BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_17"},{"key":"S0129054118500211BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052234"},{"key":"S0129054118500211BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"S0129054118500211BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_15"},{"key":"S0129054118500211BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_34"},{"key":"S0129054118500211BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_22"},{"key":"S0129054118500211BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_9"},{"key":"S0129054118500211BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_8"},{"key":"S0129054118500211BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_28"},{"key":"S0129054118500211BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.06.003"},{"key":"S0129054118500211BIB021","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1023"},{"key":"S0129054118500211BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9734-y"},{"key":"S0129054118500211BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.034"},{"issue":"3","key":"S0129054118500211BIB025","first-page":"340","volume":"17","author":"Zhou C. X.","year":"2015","journal-title":"International Journal of Network Security"},{"issue":"12","key":"S0129054118500211BIB027","first-page":"5553","volume":"10","author":"Zhou C. X.","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"2","key":"S0129054118500211BIB028","first-page":"135","volume":"17","author":"Zeng S. K.","year":"2015","journal-title":"International Journal of Network Security"},{"issue":"8","key":"S0129054118500211BIB030","first-page":"1659","volume":"15","author":"Wu W.","year":"2009","journal-title":"Journal of Universal Computer Science"},{"key":"S0129054118500211BIB031","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_6"},{"issue":"3","key":"S0129054118500211BIB035","first-page":"99","volume":"8","author":"Qi Z. H.","year":"2011","journal-title":"China Communications"},{"key":"S0129054118500211BIB036","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054118500211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T20:46:27Z","timestamp":1565124387000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054118500211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":22,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2018,10,5]]},"published-print":{"date-parts":[[2018,9]]}},"alternative-id":["10.1142\/S0129054118500211"],"URL":"https:\/\/doi.org\/10.1142\/s0129054118500211","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}