{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:38:50Z","timestamp":1725824330789},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319199610"},{"type":"electronic","value":"9783319199627"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19962-7_10","type":"book-chapter","created":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T04:28:10Z","timestamp":1435120090000},"page":"160-173","source":"Crossref","is-referenced-by-count":11,"title":["Improved Identity-Based Online\/Offline Encryption"],"prefix":"10.1007","author":[{"given":"Jianchang","family":"Lai","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Fuchun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,25]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"JH An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-id secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online\/offline key encapsulation and encryption. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 52\u201360 (2011)","DOI":"10.1145\/1966913.1966922"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chu, C., Liu, J.K., Zhou, J., Bao, F., Deng, R.H.: Practical id-based encryption for wireless sensor network. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS, pp. 337\u2013340 (2010)","DOI":"10.1145\/1755688.1755734"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S Even","year":"1996","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/off-line digital signatures. J. Cryptology 9(1), 35\u201367 (1996)","journal-title":"J. Cryptology"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Gentry","year":"2006","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-85230-8_22","volume-title":"Financial Cryptography and Data Security","author":"F Guo","year":"2008","unstructured":"Guo, F., Mu, Y., Chen, Z.: Identity-based online\/offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247\u2013261. Springer, Heidelberg (2008)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-54631-0_17","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"S Hohenberger","year":"2014","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293\u2013310. Springer, Heidelberg (2014)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-01957-9_10","volume-title":"Applied Cryptography and Network Security","author":"JK Liu","year":"2009","unstructured":"Liu, J.K., Zhou, J.: An efficient identity-based online\/offline encryption scheme. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 156\u2013167. Springer, Heidelberg (2009)"},{"key":"10_CR11","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. IACR Cryptology ePrint Archive 2003, 54 (2003)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Identity based online\/offline encryption scheme. IACR Cryptology ePrint Archive 2010, 178 (2010)","DOI":"10.1007\/978-3-642-16280-0_17"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-24586-2_11","volume-title":"Security Aspects in Information Technology","author":"SSD Selvi","year":"2011","unstructured":"Selvi, S.S.D., Vivek, S.S., Rangan, C.P.: Identity based online\/offline encryption and signcryption schemes revisited. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds.) InfoSecHiComNet 2011. LNCS, vol. 7011, pp. 111\u2013127. Springer, Heidelberg (2011)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Sun, D., Huang, X., Mu, Y., Susilo, W.: Identity-based on-line\/off-line signcryption. In: IFIP International Conference on Network and Parallel Computing, NPC, pp. 34\u201341 (2008)","DOI":"10.1109\/NPC.2008.12"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Sun, D., Mu, Y., Susilo, W.: A generic construction of identity-based online\/offline signcryption. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA, pp. 707\u2013712 (2008)","DOI":"10.1109\/ISPA.2008.16"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"B Waters","year":"2009","unstructured":"Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJGUC.2013.054492","volume":"4","author":"F Yan","year":"2013","unstructured":"Yan, F., Chen, X., Zhang, Y.: Efficient online\/offline signcryption without key exposure. IJGUC 4(1), 85\u201393 (2013)","journal-title":"IJGUC"},{"key":"10_CR19","first-page":"2659","volume":"34","author":"J Zhao","year":"2014","unstructured":"Zhao, J., Zhao, X., Shi, Y.: Certificateless signcryption with online\/offline technique. Journal of Computer Applications 34, 2659\u20132663 (2014)","journal-title":"Journal of Computer Applications"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19962-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,14]],"date-time":"2022-05-14T22:15:55Z","timestamp":1652566555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19962-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319199610","9783319199627"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19962-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}