{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:39:11Z","timestamp":1761676751477},"reference-count":28,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,6]]},"abstract":"<jats:p> Signcryption has drawn a lot of attention due to its useful applications in many areas, in particular for applications where the computation and communication resources are constrained, for example, for lightweight devices. The traditional signcryption scheme does not support the homomorphic property. Recent work by Rezaeibagha et al. (Provsec 2017) offered a provably secure homomorphic signcryption scheme, in which for the first time, provided a scheme provably secure under some restriction. In this paper, we show that the homomorphic signcryption can be extended to provably secure broadcast signcryption scheme. We allow the broadcasted signcrypted data items to be aggregated without requiring decryption that is a desirable feature in distributed environments. <\/jats:p>","DOI":"10.1142\/s0129054119400100","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:51:21Z","timestamp":1562115081000},"page":"511-529","source":"Crossref","is-referenced-by-count":10,"title":["Provably Secure (Broadcast) Homomorphic Signcryption"],"prefix":"10.1142","volume":"30","author":[{"given":"Fatemeh","family":"Rezaeibagha","sequence":"first","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"},{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, P. R. China"}]},{"given":"Shiwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"}]},{"given":"Xiaofen","family":"Wang","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"S0129054119400100BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2318435"},{"key":"S0129054119400100BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_30"},{"key":"S0129054119400100BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"S0129054119400100BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"S0129054119400100BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"S0129054119400100BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/11751595_40"},{"key":"S0129054119400100BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"S0129054119400100BIB008","first-page":"61","volume-title":"Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002","author":"Dodis Y.","year":"2002"},{"key":"S0129054119400100BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"S0129054119400100BIB010","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology \u2014 CRYPTO 1993","volume":"773","author":"Fiat A.","year":"1993"},{"key":"S0129054119400100BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_24"},{"key":"S0129054119400100BIB012","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"S0129054119400100BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"S0129054119400100BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2472369"},{"key":"S0129054119400100BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_17"},{"key":"S0129054119400100BIB016","doi-asserted-by":"publisher","DOI":"10.1002\/sec.802"},{"key":"S0129054119400100BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.08.005"},{"key":"S0129054119400100BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"S0129054119400100BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_21"},{"key":"S0129054119400100BIB020","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","volume":"1592","author":"Paillier P.","year":"1999"},{"key":"S0129054119400100BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68637-0_21"},{"key":"S0129054119400100BIB022","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008268610932"},{"key":"S0129054119400100BIB023","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008209004667"},{"key":"S0129054119400100BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.083"},{"key":"S0129054119400100BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"S0129054119400100BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"S0129054119400100BIB027","first-page":"489","author":"Zhang P.","year":"2011","journal-title":"J. Shenzhen Univ. Sci. Engin."},{"key":"S0129054119400100BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052234"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119400100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:25:52Z","timestamp":1565119552000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119400100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":28,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,7,2]]},"published-print":{"date-parts":[[2019,6]]}},"alternative-id":["10.1142\/S0129054119400100"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119400100","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}