{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:53:51Z","timestamp":1740174831352,"version":"3.37.3"},"reference-count":44,"publisher":"Wiley","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103230","61272492","61103231","61202492"],"award-info":[{"award-number":["61103230","61272492","61103231","61202492"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103230","61272492","61103231","61202492"],"award-info":[{"award-number":["61103230","61272492","61103231","61202492"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103230","61272492","61103231","61202492"],"award-info":[{"award-number":["61103230","61272492","61103231","61202492"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103230","61272492","61103231","61202492"],"award-info":[{"award-number":["61103230","61272492","61103231","61202492"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen ciphertext security, that is, ciphertexts with public verifiability. Independently, we introduced a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (<jats:sans-serif>PVPKE<\/jats:sans-serif>), and discussed its application in proxy reencryption (<jats:sans-serif>PRE<\/jats:sans-serif>) and threshold public key encryption (<jats:sans-serif>TPKE<\/jats:sans-serif>). In Crypto\u201909, Hofheiz and Kiltz introduced the group of signed quadratic residues and discussed its application; the most interesting feature of this group is its \u201cgap\u201d property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we give new constructions of<jats:sans-serif>PVPKE<\/jats:sans-serif>scheme based on signed quadratic residues and analyze their security. We also discuss<jats:sans-serif>PVPKE<\/jats:sans-serif>\u2019s important application in modern information systems, such as achieving ciphertext checkable in the cloud setting for the mobile laptop, reducing workload by the gateway between the open internet and the trusted private network, and dropping invalid ciphertext by the routers for helping the network to preserve its communication bandwidth.<\/jats:p>","DOI":"10.1155\/2015\/430797","type":"journal-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T01:15:32Z","timestamp":1422321332000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication"],"prefix":"10.1155","volume":"2015","author":[{"given":"Minqing","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi\u2019an 710072, China"},{"name":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an 710086, China"}]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an 710086, China"}]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an 710086, China"}]},{"given":"Weihua","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi\u2019an 710072, China"}]}],"member":"311","reference":[{"key":"40","doi-asserted-by":"publisher","DOI":"10.3233\/mis-130169"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.3233\/mis-130171"},{"issue":"6","key":"30","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_22"},{"key":"11","series-title":"Lecture Notes in Computer Science","first-page":"92","volume-title":"Optimal asymmetric encryption: how to encrypt with RSA","volume":"950","year":"1994"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055717"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_19"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9115-0"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_15"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.3233\/mis-130164"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.8.1987-1994"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210880"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_31"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_19"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0054113"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_18"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_37"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539702403773"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_26"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_8"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_30"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_25"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Public key encryption with keyword search","volume":"3089","year":"2004"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_13"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_10"},{"key":"7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Certificateless public key cryptography","volume":"2894","year":"2003"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89641-8_1"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_8"},{"year":"2007","key":"42"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_19"},{"volume-title":"KEM\/DEM: necessary and sucffcient conditions for secure hybrid encryption","year":"2006","series-title":"Report 2006\/256","key":"37"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/430797.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/430797.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/430797.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:23:17Z","timestamp":1498177397000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/misy\/2015\/430797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":44,"alternative-id":["430797","430797"],"URL":"https:\/\/doi.org\/10.1155\/2015\/430797","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2015]]}}}