{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:19:29Z","timestamp":1729621169486,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/dasc.2009.144","type":"proceedings-article","created":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T21:08:28Z","timestamp":1264021708000},"page":"292-294","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Two Identity Based Signcryption Schemes"],"prefix":"10.1109","author":[{"given":"Qi","family":"Xia","sequence":"first","affiliation":[]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"352","article-title":"Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity","volume":"2971","author":"chow","year":"2004","journal-title":"ICISC 2003 Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2003.1216718"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-540-73547-2_4","article-title":"Efficient identity based signcryption scheme for multiple receivers","volume":"4610","author":"yu","year":"2007","journal-title":"ATC'07 Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","article-title":"Improved identity-based signcryption","volume":"3386","author":"chen","year":"2005","journal-title":"Public Key Cryptography-PKC'05 Lecture Notes in Computer Science"},{"key":"ref11","first-page":"56","volume":"31","author":"yu","year":"2009","journal-title":"Identity-based signcryption scheme without random oracles Computer Standards & Interfaces"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","article-title":"Multipurpose identity based signcryption: a swiss army knife for identity based cryptography","volume":"2792","author":"boyen","year":"2003","journal-title":"Advance in Cryptology-CRYPTO 2003 Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","article-title":"Efficient identity based encryption without random oracles","volume":"3494","author":"waters","year":"2005","journal-title":"Advances in Cryptology-Eurocrypt'05 Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/978-3-540-30580-4_26","article-title":"Efficient multi-receiver identity based encryption and its application to broad en-cryption","volume":"3386","author":"baek","year":"2005","journal-title":"Public Key Cryptography-PKC'05 Lecture Notes in Computer Science"},{"key":"ref7","first-page":"195","article-title":"Efficient and provably secure multi-receiver identity-based signcryption","volume":"4058","author":"duan","year":"2006","journal-title":"ACISP 2006 Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Identity based signcryption","author":"malone-lee","year":"2002","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.7.1836"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","article-title":"Digital signcryption or how to achieve cost(signature & encryption) &#x00AB; cost(signature)+cost(encryption)","volume":"1294","author":"zheng","year":"1997","journal-title":"Advances in Crypto-Crypto&#x2019;97 Lecture Notes in Computer Science"}],"event":{"name":"2009 International Conference on Dependable, Autonomic and Secure Computing (DASC)","start":{"date-parts":[[2009,12,12]]},"location":"Chengdu, China","end":{"date-parts":[[2009,12,14]]}},"container-title":["2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5379503\/5380134\/05380367.pdf?arnumber=5380367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:55:03Z","timestamp":1497844503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5380367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/dasc.2009.144","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}