{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T23:16:33Z","timestamp":1648595793091},"reference-count":21,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.7.12.2987-2996","type":"journal-article","created":{"date-parts":[[2012,12,14]],"date-time":"2012-12-14T18:45:35Z","timestamp":1355510735000},"source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Certificateless Threshold Decryption Schemes Based On Pairings"],"prefix":"10.17706","volume":"7","author":[{"given":"Fei","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yilei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xueli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,12,1]]},"reference":[{"key":"ref1","first-page":"452","article-title":"Certificateless public key cryptography","volume-title":"Proceedings of the Ninth International Conference on the Theory and Application of Cryptology and Information Security","author":"Al-Riyami","year":"2003","unstructured":"[3] S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in: Proceedings of the Ninth International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 2003, pp. 452-473."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.12.1862-1869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.10.1985-1992"},{"issue":"2","key":"ref4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s00145-001-0020-9","article-title":"Securing Threshold Cryptosystems against Chosen Ciphertext Attack","volume":"15","author":"Shoup","year":"2002","unstructured":"[8] V. Shoup and R. Gennaro, Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Journal of Cryptology 15 (2) (2002) 75 -96.","journal-title":"J Cryptology","ISSN":"http:\/\/id.crossref.org\/issn\/0933-2790","issn-type":"print"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.6.1345-1352"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.06.014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-008-0055-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.12.008"},{"key":"ref9","first-page":"134","article-title":"Certificateless public key encryption without pairing.","volume-title":"Proceedings of the 8th International Conference on Information Security (ISC 2005)","volume":"3650","author":"Baek","year":"2005","unstructured":"[18] J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In J. Zhou and J. Lopez, editors, Proceedings of the 8th International Conference on Information Security (ISC 2005), volume 3650 of Lecture Notes in Computer Science, pages 134-148. Springer-Verlag, 2005."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[1] A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of Crypto 84, LNCS, vol.196, Springer-Verlag, 1984, pp. 47-53.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[2] D. Boneh, M. Franklin, Identity-Based encryption from the Weil pairing, in: Proceedings of Crypto 2001, LNCS, vol.2139, Springer-Verlag, 2001, pp.213-229.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[4] Y. Desmedt and Y. Frankel, Threshold cryptosystems, in: Proceedings of CRYPTO'89, LNCS, vol.435, Spinger-Verlag, 190, pp.307- 315.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[7] A. Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to share a function securely, in: Proceedings of 26th ACM STOC, ACM Press, 1994, pp.522-533.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[9] Z. Tan. Improvement on a Threshold Authenticated Encryption Scheme. Journal of Software, Vol 5, No 7 (2010), 697-704, Jul 2010","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[10] J. Baek, Y. Zheng, Identity-based threshold decryption, in: Proceedings of PKC04, LNCS, vol.2947, Springer-Verlag, 2004, pp. 26-76.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[11] J. Baek, Y. Zheng, Identity-Based Threshold Signature Scheme from the Bilinear Pairings, in:Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), vol.2, IEEE Computer Society, PP.124-128.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[12] M. Scott. Computing the Tate Pairing. in: Proceedinsg of CT-RSA 2005, LNCS 3376, Springer-Verlag,2005, pp. 293C304.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[14] A. L. Ferrara, M. Green, S. Hohenberger and M. Pedersen, Short Signature Batch Verification, in: Proceedings of CT-RSA 2009, LNCS, vol.5473, Springer-Verlag, 2009, pp.309-324.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[19] J. Lai and K. Kou. Self-generated-certificate public key encryption without pairing. In T. Okamoto and X. Wang, editors, Public Key Cryptography - PKC 2007, volume 4450 of Lecture Notes in Computer Science, pages 476-489. Springer-Verlag, 2007.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"[20] V. Shoup, Sequences of Games: A Tool for Taming Complexity in Security Proofs, Cryptology ePrint report 2004\/332, 2004","DOI":"10.1007\/s00145-004-0314-9"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T00:11:56Z","timestamp":1498003916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/8832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,1]]},"references-count":21,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2012,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.7.12.2987-2996","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,12,1]]}}}