{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:05Z","timestamp":1740149045545,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Defense Pre-Research Plan for the 13-th Five Years Project","award":["90407180012","61771361","2020JQ-319"],"award-info":[{"award-number":["90407180012","61771361","2020JQ-319"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["90407180012","61771361","2020JQ-319"],"award-info":[{"award-number":["90407180012","61771361","2020JQ-319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Plan Project of Shaanxi Province","award":["90407180012","61771361","2020JQ-319"],"award-info":[{"award-number":["90407180012","61771361","2020JQ-319"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,8,28]]},"abstract":"<jats:p>In this paper, we propose a certificateless noninteractive key exchange protocol. No message exchange is required in the protocol, and this feature will facilitate the applications where the communication overhead matters, for example, the communications between the satellites and the earth. The public key certificate is removed as well as the key escrow problem using the certificateless public key cryptosystem. The security of the protocol rests on the bilinear Diffie\u2013Hellman problem, and it could be proved in the random oracle model. Compared with previous protocols, the new protocol reduces the running time by at least 33.0%.<\/jats:p>","DOI":"10.1155\/2020\/8862476","type":"journal-article","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T03:23:11Z","timestamp":1598671391000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Certificateless Noninteractive Key Exchange Protocol with Provable Security"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9421-9358","authenticated-orcid":true,"given":"Xuefei","family":"Cao","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, No. 2 South Taibai Rd., Xi\u2019an 710071, China"}]},{"given":"Lanjun","family":"Dang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, No. 2 South Taibai Rd., Xi\u2019an 710071, China"}]},{"given":"Yingzi","family":"Luan","sequence":"additional","affiliation":[{"name":"School of Telecommunication Engineering, Xidian University, No. 2 South Taibai Rd., Xi\u2019an 710071, China"}]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, No. 2 South Taibai Rd., Xi\u2019an 710071, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10879-7_1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1976.1055638"},{"issue":"4","key":"3","first-page":"137","volume":"42","year":"2016","journal-title":"Computer Engineering"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1218"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9041-6"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_17"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_3"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_71"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/bf00129771"},{"first-page":"26","volume-title":"Cryptosystems based on pairing","year":"2000","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2005.03.024"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-009-9278-y"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9486-0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol4.issue6.38"},{"issue":"4","key":"20","first-page":"334","volume":"1","year":"2014","journal-title":"Journal of Cryptologic Research"},{"first-page":"453","volume-title":"Analysis of key exchange protocols and their usage in building secure channels","year":"2001","key":"21"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2018.2807383"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2927512"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2974258"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8862476.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8862476.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8862476.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T03:23:17Z","timestamp":1598671397000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8862476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":21,"alternative-id":["8862476","8862476"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8862476","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,8,28]]}}}