{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:11:57Z","timestamp":1776917517180,"version":"3.51.2"},"reference-count":53,"publisher":"Walter de Gruyter GmbH","issue":"2","license":[{"start":{"date-parts":[[2017,5,17]],"date-time":"2017-05-17T00:00:00Z","timestamp":1494979200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>We introduce a new cryptographic primitive identity-based anonymous proxy\nsigncryption which provides anonymity to the proxy sender while\nalso providing a mechanism to the original sender to expose the\nidentity of the proxy sender in case of misuse. We introduce a\nformal definition of an identity-based anonymous proxy signcryption\n(IBAPS) scheme and give a security model for it. We also construct\nan IBAPS scheme and prove its security under the discrete logarithm\nassumption and computational Diffie\u2013Hellman assumption. Moreover,\nwe do an efficiency comparison with the existing identity-based\nsigncryption schemes and anonymous signcryption schemes and show\nthat our scheme is much more efficient than those schemes, we also\ncompare the efficiency of our scheme with the available proxy\nsigncryption schemes and show that our scheme provides anonymity to\nthe proxy sender at cost less than those of existing proxy\nsigncryption schemes.<\/jats:p>","DOI":"10.1515\/jmc-2015-0014","type":"journal-article","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T06:02:06Z","timestamp":1495173726000},"page":"63-84","source":"Crossref","is-referenced-by-count":6,"title":["A secure anonymous proxy signcryption scheme"],"prefix":"10.1515","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7082-9568","authenticated-orcid":false,"given":"Vishal","family":"Saraswat","sequence":"first","affiliation":[{"name":"R.C. Bose Centre for Cryptology and Cyber Security , Indian Statistical Institute , Kolkata 700108 , India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rajeev Anand","family":"Sahu","sequence":"additional","affiliation":[{"name":"Department d\u2019Informatique , Universit\u00e9 Libre de Bruxelles , Brussels , Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5500-0361","authenticated-orcid":false,"given":"Amit K.","family":"Awasthi","sequence":"additional","affiliation":[{"name":"Group for Cryptology Research , Gautam Buddha University , Greater Noida 201308, UP , India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"374","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"2025120600300517639_j_jmc-2015-0014_ref_001_w2aab3b7d401b1b6b1ab2b1b1Aa","doi-asserted-by":"crossref","unstructured":"J. Baek, R. Steinfeld and Y. Zheng,\nFormal proofs for the security of signcryption,\nJ. Cryptology 20 (2007), no. 2, 203\u2013235.","DOI":"10.1007\/s00145-007-0211-0"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_002_w2aab3b7d401b1b6b1ab2b1b2Aa","doi-asserted-by":"crossref","unstructured":"P. S. L. M. Barreto, B. Libert, N. McCullagh and J.-J. Quisquater,\nEfficient and provably-secure identity-based signatures and signcryption from bilinear maps,\nAdvances in Cryptology \u2013 ASIACRYPT 2005,\nLecture Notes in Comput. Sci. 3788,\nSpringer, Berlin (2005), 515\u2013532.","DOI":"10.1007\/11593447_28"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_003_w2aab3b7d401b1b6b1ab2b1b3Aa","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Boldyreva, A. Desai and D. Pointcheval,\nKey-privacy in public-key encryption,\nAdvances in Cryptology \u2013 ASIACRYPT 2001,\nLecture Notes in Comput. Sci. 2248,\nSpringer, Berlin (2001), 566\u2013582.","DOI":"10.1007\/3-540-45682-1_33"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_004_w2aab3b7d401b1b6b1ab2b1b4Aa","doi-asserted-by":"crossref","unstructured":"X. Boyen,\nMultipurpose identity-based signcryption,\nAdvances in Cryptology \u2013 CRYPTO 2003,\nLecture Notes in Comput. Sci. 2729,\nSpringer, Berlin (2003), 383\u2013399.","DOI":"10.1007\/978-3-540-45146-4_23"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_005_w2aab3b7d401b1b6b1ab2b1b5Aa","doi-asserted-by":"crossref","unstructured":"X. Cao, W. Kou and X. Du,\nA pairing-free identity-based authenticated key agreement protocol with minimal message exchanges,\nInform. Sci. 180 (2010), no. 15, 2895\u20132903.","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_006_w2aab3b7d401b1b6b1ab2b1b6Aa","doi-asserted-by":"crossref","unstructured":"L. Chen and J. Malone-Lee,\nImproved identity-based signcryption,\nPublic Key Cryptography \u2013 PKC 2005,\nLecture Notes in Comput. Sci. 2286,\nSpringer, Berlin (2005), 362\u2013379.","DOI":"10.1007\/978-3-540-30580-4_25"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_007_w2aab3b7d401b1b6b1ab2b1b7Aa","doi-asserted-by":"crossref","unstructured":"T. Chik-How,\nOn the security of signcryption scheme with key privacy,\nIEICE Trans. Fundam. Electron. Comm. Comput. Sci. 88 (2005), no. 4, 1093\u20131095.","DOI":"10.1093\/ietfec\/e88-a.4.1093"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_008_w2aab3b7d401b1b6b1ab2b1b8Aa","doi-asserted-by":"crossref","unstructured":"Y. Cui and G. Hanaoka,\nApplications of signcryption,\nPractical Signcryption,\nSpringer, Berlin (2010), 241\u2013256.","DOI":"10.1007\/978-3-540-89411-7_12"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_009_w2aab3b7d401b1b6b1ab2b1b9Aa","doi-asserted-by":"crossref","unstructured":"H. Debiao, C. Jianhua and H. Jin,\nAn id-based proxy signature schemes without bilinear pairings,\nAnn. Telecommun. 66 (2011), no. 11\u201312, 657\u2013662.","DOI":"10.1007\/s12243-011-0244-0"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_010_w2aab3b7d401b1b6b1ab2b1c10Aa","doi-asserted-by":"crossref","unstructured":"L. Deng, C. Liu and X. Wang,\nAn improved identity-based ring signcryption scheme,\nInf. Secur. J. 22 (2013), no. 1, 46\u201354.","DOI":"10.1080\/19393555.2013.788685"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_011_w2aab3b7d401b1b6b1ab2b1c11Aa","doi-asserted-by":"crossref","unstructured":"R. Dingledine, N. Mathewson and P. Syverson,\nTor: The second-generation onion router,\nProceedings of the 13th Conference on USENIX Security Symposium \u2013 Volume 13,\nUSENIX Association, Berkeley (2004), 303\u2013320.","DOI":"10.21236\/ADA465464"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_012_w2aab3b7d401b1b6b1ab2b1c12Aa","doi-asserted-by":"crossref","unstructured":"S. Duan, Z. Cao and Y. Zhou,\nSecure delegation-by-warrant id-based proxy signcryption scheme,\nProceedings of the 2005 International Conference on Computational Intelligence and Security,\nLecture Notes in Comput. Sci. 3802,\nSpringer, Berlin (2005), 445\u2013450.","DOI":"10.1007\/11596981_65"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_013_w2aab3b7d401b1b6b1ab2b1c13Aa","doi-asserted-by":"crossref","unstructured":"H. Elkamchouchi and Y. Abouelseoud,\nA new proxy identity-based signcryption scheme for partial delegation of signing rights,\nIACR Cryptology ePrint Archive (2008), https:\/\/eprint.iacr.org\/2008\/041.pdf.","DOI":"10.1109\/ccnc08.2007.249"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_014_w2aab3b7d401b1b6b1ab2b1c14Aa","unstructured":"C. Gamage, J. Leiwo and Y. Zheng,\nAn efficient scheme for secure message transmission using proxy-signcryption,\npreprint (1999)."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_015_w2aab3b7d401b1b6b1ab2b1c15Aa","doi-asserted-by":"crossref","unstructured":"C. Gamage, J. Leiwo and Y. Zheng,\nEncrypted message authentication by firewalls,\nPublic Key Cryptography \u2013 PKC\u201999,\nLecture Notes in Comput. Sci. 1560,\nSpringer, Berlin (1999), 69\u201381.","DOI":"10.1007\/3-540-49162-7_6"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_016_w2aab3b7d401b1b6b1ab2b1c16Aa","unstructured":"C. Gamage and Y. Zheng,\nSecure high speed networking with ABT and signcryption,\nunpublished Manuscript (1997)."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_017_w2aab3b7d401b1b6b1ab2b1c17Aa","unstructured":"G. Hanaoka and Y. Zheng,\nImproving the secure electronic transaction protocol by using signcryption,\nIEICE Trans. Fundam. Electron. Comm. Comput. Sci. 84 (2001), no. 8, 2042\u20132051."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_018_w2aab3b7d401b1b6b1ab2b1c18Aa","unstructured":"J. Herranz and G. S\u00e1ez,\nA provably secure id-based ring signature scheme,\nIACR Cryptology ePrint Archive (2003),\nhttps:\/\/eprint.iacr.org\/2003\/261.ps."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_019_w2aab3b7d401b1b6b1ab2b1c19Aa","unstructured":"X. Huang, W. Susilo, Y. Mu and F. Zhang,\nIdentity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world,\n19th International Conference on Advanced Information Networking and Applications \u2013 AINA 2005,\nIEEE Press, Piscataway (2005), 649\u2013654."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_020_w2aab3b7d401b1b6b1ab2b1c20Aa","doi-asserted-by":"crossref","unstructured":"E. Kim, K. Nahrstedt, L. Xiao and K. Park,\nIdentity-based registry for secure interdomain routing,\nProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security \u2013 ASIACCS 2006,\nACM Press, New York (2006), 321\u2013331.","DOI":"10.1145\/1128817.1128866"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_021_w2aab3b7d401b1b6b1ab2b1c21Aa","unstructured":"S. Lal and P. Kushwah,\nAnonymous id based signcryption scheme for multiple receivers,\nIACR Cryptology ePrint Archive (2009), https:\/\/eprint.iacr.org\/2009\/345.pdf."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_022_w2aab3b7d401b1b6b1ab2b1c22Aa","doi-asserted-by":"crossref","unstructured":"F. Li, S. Masaaki and T. Tsuyoshi,\nAnalysis and improvement of authenticatable ring signcryption scheme,\nJ. Shanghai Jiaotong Univ. Sci. 13 (2008), no. 6, 679\u2013683.","DOI":"10.1007\/s12204-008-0679-2"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_023_w2aab3b7d401b1b6b1ab2b1c23Aa","unstructured":"X. Li and K. Chen,\nIdentity based proxy-signcryption scheme from pairings,\nIEEE International Conference on Services Computing \u2013 SCC 2004,\nIEEE Press, Piscataway (2004), 494\u2013497."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_024_w2aab3b7d401b1b6b1ab2b1c24Aa","doi-asserted-by":"crossref","unstructured":"B. Libert and J.-J. Quisquater,\nA new identity based signcryption scheme from pairings,\nIEEE Information Theory Workshop,\nIEEE Press, Piscataway (2003), 155\u2013158.","DOI":"10.1109\/ITW.2003.1216718"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_025_w2aab3b7d401b1b6b1ab2b1c25Aa","doi-asserted-by":"crossref","unstructured":"B. Libert and J.-J. Quisquater,\nEfficient signcryption with key privacy from gap Diffie\u2013Hellman groups,\nPublic Key Cryptography \u2013 PKC 2004,\nLecture Notes in Comput. Sci. 2947,\nSpringer, Berlin (2004), 187\u2013200.","DOI":"10.1007\/978-3-540-24632-9_14"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_026_w2aab3b7d401b1b6b1ab2b1c26Aa","unstructured":"J. Malone-Lee,\nIdentity-based signcryption,\nIACR Cryptology ePrint Archive (2002), https:\/\/eprint.iacr.org\/2002\/098.pdf."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_027_w2aab3b7d401b1b6b1ab2b1c27Aa","unstructured":"M. Mambo, K. Usuda and E. Okamoto,\nProxy signatures: Delegation of the power to sign messages,\nIEICE Trans. Fundam. Electron. Comm. Comput. Sci. 79 (1996), no. 9, 1338\u20131354."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_028_w2aab3b7d401b1b6b1ab2b1c28Aa","doi-asserted-by":"crossref","unstructured":"K. Matsuura, Y. Zheng and H. Imai,\nCompact and flexible resolution of CBT multicast key-distribution,\nWorldwide Computing and Its Applications \u2013 WWCA\u201998,\nLecture Notes in Comput. Sci. 1368,\nSpringer, Berlin (1998), 190\u2013205.","DOI":"10.1007\/3-540-64216-1_49"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_029_w2aab3b7d401b1b6b1ab2b1c29Aa","unstructured":"T. Nishioka, K. Matsuura, Y. Zheng and H. Imai,\nA proposal for authenticated key recovery system,\nJoint Workshop on Information Security and Cryptology \u2013 JW-ISC\u201997,\nKIISC, Seoul (1997), 19\u201330."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_030_w2aab3b7d401b1b6b1ab2b1c30Aa","doi-asserted-by":"crossref","unstructured":"L. Pang, H. Li, L. Gao and Y. Wang,\nCompletely anonymous multi-recipient signcryption scheme with public verification,\nPLOS ONE 8 (2013), 10.1371\/journal.pone.0063562.","DOI":"10.1371\/journal.pone.0063562"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_031_w2aab3b7d401b1b6b1ab2b1c31Aa","doi-asserted-by":"crossref","unstructured":"B.-N. Park and W. Lee,\nIsmanet: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks,\nIEICE Trans. Commun. 88 (2005), no. 6, 2548\u20132556.","DOI":"10.1093\/ietcom\/e88-b.6.2548"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_032_w2aab3b7d401b1b6b1ab2b1c32Aa","doi-asserted-by":"crossref","unstructured":"N. Park, K. Moon, K. Chung, D. Won and Y. Zheng,\nA security acceleration using XML signcryption scheme in mobile grid web services,\nProceedings of the 5th International Conference on Web Engineering \u2013 ICWE\u201905,\nSpringer, Berlin (2005), 191\u2013196.","DOI":"10.1007\/11531371_27"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_033_w2aab3b7d401b1b6b1ab2b1c33Aa","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir and Y. Tauman,\nHow to leak a secret,\nAdvances in Cryptology \u2013 ASIACRYPT 2001,\nLecture Notes in Comput. Sci. 2248,\nSpringer, Berlin (2001), 552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_034_w2aab3b7d401b1b6b1ab2b1c34Aa","doi-asserted-by":"crossref","unstructured":"V. Saraswat and R. A. Sahu,\nA secure anonymous proxy multi-signature scheme,\n11th International Conference on Security and Cryptography \u2013 SECRYPT 2014,\nSciTePress, Set\u00fabal (2014), 55\u201366.","DOI":"10.5220\/0005021200550066"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_035_w2aab3b7d401b1b6b1ab2b1c35Aa","doi-asserted-by":"crossref","unstructured":"V. Saraswat and A. Yun,\nAnonymous signatures revisited,\nProvable Security \u2013 ProvSec 2009,\nLecture Notes in Comput. Sci. 5848,\nSpringer, Berlin (2009), 140\u2013153.","DOI":"10.1007\/978-3-642-04642-1_13"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_036_w2aab3b7d401b1b6b1ab2b1c36Aa","doi-asserted-by":"crossref","unstructured":"M. Seo and K. Kim,\nElectronic funds transfer protocol using domain-verifiable signcryption scheme,\nInformation Security and Cryptology \u2013 ICISC \u201999,\nLecture Notes in Comput. Sci. 1787,\nSpringer, Berlin (2000), 269\u2013277.","DOI":"10.1007\/10719994_21"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_037_w2aab3b7d401b1b6b1ab2b1c37Aa","doi-asserted-by":"crossref","unstructured":"S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan,\nOn the security of identity based ring signcryption schemes,\nInformation Security \u2013 ISC 2009,\nLecture Notes in Comput. Sci. 5735,\nSpringer, Berlin (2009), 310\u2013325.","DOI":"10.1007\/978-3-642-04474-8_25"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_038_w2aab3b7d401b1b6b1ab2b1c38Aa","doi-asserted-by":"crossref","unstructured":"M. Wang, H. Li and Z. Liu,\nEfficient identity based proxy-signcryption schemes with forward security and public verifiability,\nNetworking and Mobile Computing,\nLecture Notes in Comput. Sci. 3619,\nSpringer, Berlin (2005), 982\u2013991.","DOI":"10.1007\/11534310_103"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_039_w2aab3b7d401b1b6b1ab2b1c39Aa","doi-asserted-by":"crossref","unstructured":"G. Yang, D. S. Wong, X. Deng and H. Wang,\nAnonymous signature schemes,\nPublic Key Cryptography \u2013 PKC 2006,\nLecture Notes in Comput. Sci. 3958,\nSpringer, Berlin (2006), 347\u2013363.","DOI":"10.1007\/11745853_23"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_040_w2aab3b7d401b1b6b1ab2b1c40Aa","doi-asserted-by":"crossref","unstructured":"Y. Yu, F. Li, C. Xu and Y. Sun,\nAn efficient identity-based anonymous signcryption scheme,\nWuhan Univ. J. Nat. Sci. 13 (2008), no. 6, 670\u2013674.","DOI":"10.1007\/s11859-008-0607-1"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_041_w2aab3b7d401b1b6b1ab2b1c41Aa","doi-asserted-by":"crossref","unstructured":"B. Zhang and Q. Xu,\nAn id-based anonymous signcryption scheme for multiple receivers secure in the standard model,\nAdvances in Computer Science and Information Technology,\nLecture Notes in Comput. Sci. 6059,\nSpringer, Berlin (2010), 15\u201327.","DOI":"10.1007\/978-3-642-13577-4_2"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_042_w2aab3b7d401b1b6b1ab2b1c42Aa","doi-asserted-by":"crossref","unstructured":"J. Zhang, S. Gao, H. Chen and Q. Geng,\nA novel id-based anonymous signcryption scheme,\nAdvances in Data and Web Management,\nLecture Notes in Comput. Sci. 5446,\nSpringer, Berlin (2009), 604\u2013610.","DOI":"10.1007\/978-3-642-00672-2_58"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_043_w2aab3b7d401b1b6b1ab2b1c43Aa","doi-asserted-by":"crossref","unstructured":"M. Zhang, B. Yang, S. Zhu and W. Zhang,\nEfficient secret authenticatable anonymous signcryption scheme with identity privacy,\nProceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics,\nSpringer, Berlin (2008), 126\u2013137.","DOI":"10.1007\/978-3-540-69304-8_14"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_044_w2aab3b7d401b1b6b1ab2b1c44Aa","unstructured":"M. Zhang, Y. Zhong, P. Li and B. Yang,\nAnalysis and enhance of anonymous signcryption scheme,\nIACR Cryptology ePrint Archive (2009), https:\/\/eprint.iacr.org\/2009\/194.pdf."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_045_w2aab3b7d401b1b6b1ab2b1c45Aa","doi-asserted-by":"crossref","unstructured":"Y. Zheng,\nDigital signcryption or how to achieve cost(signature & encryption) \u2264{{\\leq}} cost(signature) + cost(encryption),\nAdvances in Cryptology \u2013 CRYPTO \u201997,\nLecture Notes in Comput. Sci. 1294,\nSpringer, Berlin (1997), 165\u2013179.","DOI":"10.1007\/BFb0052234"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_046_w2aab3b7d401b1b6b1ab2b1c46Aa","unstructured":"Y. Zheng and H. Imai,\nCompact and unforgeable key establishment over an ATM network,\nProceedings of the 17th Annual Joint Conference of the IEEE Computer and Communications Societies \u2013 INFOCOM \u201998,\nIEEE Press, Piscataway (1998), 411\u2013418."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_047_w2aab3b7d401b1b6b1ab2b1c47Aa","doi-asserted-by":"crossref","unstructured":"Z. Zhu, Y. Zhang and F. Wang,\nAn efficient and provable secure identity-based ring signcryption scheme,\nComput. Stand. Interfaces 31 (2009), no. 6, 1092\u20131097.","DOI":"10.1016\/j.csi.2008.09.023"},{"key":"2025120600300517639_j_jmc-2015-0014_ref_048_w2aab3b7d401b1b6b1ab2b1c48Aa","unstructured":"Firstpost,\nVote for Sule or no water: Did Ajit Pawar threaten Baramati voters?,\npreprint 2014, http:\/\/www.firstpost.com\/politics\/vote-for-sule-or-no-water-did-ajit-pawar-threaten-baramati-voters-1485739.html."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_049_w2aab3b7d401b1b6b1ab2b1c49Aa","unstructured":"Mail Online,\nBaramati residents claim politicians have threatened to cut off their water if they don\u2019t vote for Pawar candidate,\npreprint 2014, http:\/\/www.dailymail.co.uk\/indiahome\/indianews\/article-2608989\/Baramati-residents-claim-politicians-threatened-cut-water-dont-vote-Pawar-candidate.html."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_050_w2aab3b7d401b1b6b1ab2b1c50Aa","unstructured":"MasterCard and Visa,\nSecure electronic transaction specification \u2013 Book 1: Business description, 1997."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_051_w2aab3b7d401b1b6b1ab2b1c51Aa","unstructured":"MasterCard and Visa,\nSecure electronic transaction specification \u2013 Book 2: Programmer\u2019s guide, 1997."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_052_w2aab3b7d401b1b6b1ab2b1c52Aa","unstructured":"MIRACL,\nMultiprecision integer and rational arithmetic cryptographic library,\nhttp:\/\/certivox.org\/display\/EXT\/MIRACL."},{"key":"2025120600300517639_j_jmc-2015-0014_ref_053_w2aab3b7d401b1b6b1ab2b1c53Aa","unstructured":"The Telegraph,\nVote for my cousin or we\u2019ll cut off your water, minister warns Indian farmers,\npreprint 2014, http:\/\/www.telegraph.co.uk\/news\/worldnews\/asia\/india\/10775156\/Vote-for-my-cousin-or-well-cut-off-your-water-minister-warns-Indian-farmers.html."}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jmc.2017.11.issue-2\/jmc-2015-0014\/jmc-2015-0014.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2015-0014\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2015-0014\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:31:12Z","timestamp":1764981072000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2015-0014\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,17]]},"references-count":53,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,5,17]]},"published-print":{"date-parts":[[2017,6,1]]}},"alternative-id":["10.1515\/jmc-2015-0014"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2015-0014","relation":{},"ISSN":["1862-2984","1862-2976"],"issn-type":[{"value":"1862-2984","type":"electronic"},{"value":"1862-2976","type":"print"}],"subject":[],"published":{"date-parts":[[2017,5,17]]}}}