{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:29:12Z","timestamp":1765438152846,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,16]],"date-time":"2009-03-16T00:00:00Z","timestamp":1237161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,16]]},"DOI":"10.1145\/1514274.1514278","type":"proceedings-article","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T15:36:08Z","timestamp":1237304168000},"page":"21-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Certificate-based sequential aggregate signature"],"prefix":"10.1145","author":[{"given":"Joseph K.","family":"Liu","sequence":"first","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]},{"given":"Joonsang","family":"Baek","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2009,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"452","volume-title":"ASIACRYPT '03","author":"Al-Riyami S. S.","year":"2003","unstructured":"S. S. Al-Riyami and K. Paterson . Certificateless public key cryptography . In ASIACRYPT '03 , volume 2894 of LNCS , pages 452 -- 473 . Springer-Verlag , 2003 . S. S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In ASIACRYPT '03, volume 2894 of LNCS, pages 452--473. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266997"},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"79","volume-title":"ISPEC '07","author":"Au M.","year":"2007","unstructured":"M. Au , J. Liu , W. Susilo , and T. Yuen . Certificate based (linkable) ring signature . In ISPEC '07 , volume 4464 of LNCS , pages 79 -- 92 . Springer-Verlag , 2007 . M. Au, J. Liu, W. Susilo, and T. Yuen. Certificate based (linkable) ring signature. In ISPEC '07, volume 4464 of LNCS, pages 79--92. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315280"},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"213","volume-title":"CRYPTO '01","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. K. Franklin . Identity-Based Encryption from the Weil Pairing . In CRYPTO '01 , volume 2139 of LNCS , pages 213 -- 229 . Springer , 2001 . D. Boneh and M. K. Franklin. Identity-Based Encryption from the Weil Pairing. In CRYPTO '01, volume 2139 of LNCS, pages 213--229. Springer, 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"514","volume-title":"AsiaCrypt","author":"Boneh D.","year":"2001","unstructured":"D. Boneh , B. Lynn , and H. Shacham . Short signatures from Weil pairing . In AsiaCrypt 2001 , volume 2248 of LNCS , pages 514 -- 532 , 2001. D. Boneh, B. Lynn, and H. Shacham. Short signatures from Weil pairing. In AsiaCrypt 2001, volume 2248 of LNCS, pages 514--532, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766194"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_17"},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"463","article-title":"Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. Journal of Universal Computer Science","volume":"14","author":"Hwang Y.","year":"2008","unstructured":"Y. Hwang , J. Liu , and S. Chow . Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. Journal of Universal Computer Science , Special Issue on Cryptography in Computer System Security. , 14 ( 3 ): 463 -- 480 , 2008 . Y. Hwang, J. Liu, and S. Chow. Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. Journal of Universal Computer Science, Special Issue on Cryptography in Computer System Security., 14(3):463--480, 2008.","journal-title":"Special Issue on Cryptography in Computer System Security."},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"99","volume-title":"CR--RSA '04","author":"Kang B. G.","year":"2004","unstructured":"B. G. Kang , J. H. Park , and S. G. Hahn . A certificate-based signature scheme . In CR--RSA '04 , volume 2964 of LNCS , pages 99 -- 111 . Springer , 2004 . B. G. Kang, J. H. Park, and S. G. Hahn. A certificate-based signature scheme. In CR--RSA '04, volume 2964 of LNCS, pages 99--111. Springer, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"110","volume-title":"EuroPKI '07","author":"Li J.","year":"2007","unstructured":"J. Li , X. Huang , Y. Mu , W. Susilo , and Q. Wu . Certificate-based signature: Security model and efficient construction . In EuroPKI '07 , volume 4582 of LNCS , pages 110 -- 125 . Springer , 2007 . J. Li, X. Huang, Y. Mu, W. Susilo, and Q. Wu. Certificate-based signature: Security model and efficient construction. In EuroPKI '07, volume 4582 of LNCS, pages 110--125. Springer, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266994"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_28"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","first-page":"47","volume-title":"CRYPTO '84","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-Based Cryptosystems and Signature Schemes . In CRYPTO '84 , volume 196 of LNCS , pages 47 -- 53 . Springer , 1984 . A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO '84, volume 196 of LNCS, pages 47--53. Springer, 1984."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_20"}],"event":{"name":"WISEC '09: Second ACM Conference on Wireless Network Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Zurich Switzerland","acronym":"WISEC '09"},"container-title":["Proceedings of the second ACM conference on Wireless network security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1514274.1514278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:19Z","timestamp":1750253419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,16]]},"references-count":20,"alternative-id":["10.1145\/1514274.1514278","10.1145\/1514274"],"URL":"https:\/\/doi.org\/10.1145\/1514274.1514278","relation":{},"subject":[],"published":{"date-parts":[[2009,3,16]]},"assertion":[{"value":"2009-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}