{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:44:05Z","timestamp":1761324245890,"version":"3.40.5"},"reference-count":20,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T00:00:00Z","timestamp":1570492800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,10,8]]},"abstract":"<jats:p>We introduce a general concept of <jats:italic>multidivisible online\/offline (MDO) cryptography<\/jats:italic>, which covers the previous works including online\/offline cryptographic schemes, divisible online\/offline signatures, incrementally executable signcryptions, and multidivisible online\/offline encryptions. We then present the notion of <jats:italic>multidivisible online\/offline signcryptions<\/jats:italic> (MDOSCs) as novel application of MDO cryptography. We define several security notions for MDOSCs and show implications and separations between these security notions. We also present a generic construction of MDOSC that achieves the strongest security notions with regard to confidentiality and unforgeability. Using MDOSC schemes, the computationally restricted and\/or bandwidth-restricted devices can transmit messages in both confidential and authenticated way with low computational overhead and\/or low-bandwidth network.<\/jats:p>","DOI":"10.1155\/2019\/1042649","type":"journal-article","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:30:18Z","timestamp":1570563018000},"page":"1-21","source":"Crossref","is-referenced-by-count":2,"title":["Multidivisible Online\/Offline Cryptography and Its Application to Signcryptions"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9457-554X","authenticated-orcid":true,"given":"Dan","family":"Yamamoto","sequence":"first","affiliation":[{"name":"Hitachi, Ltd., Yokohama, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4671-4485","authenticated-orcid":true,"given":"Wakaha","family":"Ogata","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_24"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900003"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_22"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_10"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_10"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21518-6_3"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_15"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.e100.a.91"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9167-4"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10628-6_22"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_18"},{"key":"22","first-page":"443","volume-title":"Secure identity based encryption without random oracles","volume":"3152","year":"2004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_21"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_13"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2010.07.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0310-8"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/1042649.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/1042649.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/1042649.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:30:20Z","timestamp":1570563020000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/1042649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,8]]},"references-count":20,"alternative-id":["1042649","1042649"],"URL":"https:\/\/doi.org\/10.1155\/2019\/1042649","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,10,8]]}}}