{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:57:58Z","timestamp":1757541478884,"version":"3.37.3"},"reference-count":58,"publisher":"Oxford University Press (OUP)","issue":"12","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272542","61672207"],"award-info":[{"award-number":["61272542","61672207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016B10114"],"award-info":[{"award-number":["2016B10114"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20161511"],"award-info":[{"award-number":["BK20161511"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,1]]},"DOI":"10.1093\/comjnl\/bxx031","type":"journal-article","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:29:58Z","timestamp":1489681798000},"page":"1729-1744","source":"Crossref","is-referenced-by-count":3,"title":["Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model"],"prefix":"10.1093","volume":"60","author":[{"given":"Yang","family":"Lu","sequence":"first","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"given":"Jiguo","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"}]}],"member":"286","published-online":{"date-parts":[[2017,3,28]]},"reference":[{"year":"1985","author":"Shamir","key":"key\n\t\t\t\t20180328152220_bxx031C1"},{"year":"2003","author":"Al-Riyami","key":"key\n\t\t\t\t20180328152220_bxx031C2"},{"year":"2007","author":"Liu","key":"key\n\t\t\t\t20180328152220_bxx031C3"},{"key":"key\n\t\t\t\t20180328152220_bxx031C4","first-page":"463","article-title":"Certificateless public key encryption secure against malicious KGC attacks in the standard model","volume":"14","author":"Hwang","year":"2008","journal-title":"J. Univers. Comput. Sci."},{"key":"key\n\t\t\t\t20180328152220_bxx031C5","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1049\/iet-ifs.2011.0004","article-title":"Improved certificateless signature scheme provably secure in the standard model","volume":"6","author":"Yu","year":"2012","journal-title":"IET Inf. Security"},{"key":"key\n\t\t\t\t20180328152220_bxx031C6","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1002\/sec.826","article-title":"Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles","volume":"7","author":"Yang","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180328152220_bxx031C7","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1093\/comjnl\/bxt127","article-title":"Comments on \u2018Efficient Revocable Certificateless Encryption Secure in the Standard Model\u2019","volume":"58","author":"Tang","year":"2015","journal-title":"Comput. J."},{"year":"2003","author":"Gentry","key":"key\n\t\t\t\t20180328152220_bxx031C8"},{"year":"2008","author":"Liu","key":"key\n\t\t\t\t20180328152220_bxx031C9"},{"key":"key\n\t\t\t\t20180328152220_bxx031C10","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1093\/comjnl\/bxr130","article-title":"A provably secure construction of certificate-based encryption from certificateless encryption","volume":"55","author":"Wu","year":"2012","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180328152220_bxx031C11","first-page":"1553","article-title":"Efficient construction of certificate-based encryption secure against public key replacement attacks in the standard model","volume":"30","author":"Lu","year":"2014","journal-title":"J. Inf. Sci. Eng."},{"key":"key\n\t\t\t\t20180328152220_bxx031C12","doi-asserted-by":"crossref","first-page":"3346","DOI":"10.1002\/sec.1258","article-title":"Leakage-resilient certificate-based encryption","volume":"8","author":"Yu","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180328152220_bxx031C13","doi-asserted-by":"crossref","first-page":"2747","DOI":"10.1093\/comjnl\/bxv045","article-title":"Generic construction of certificate-based encryption from certificateless encryption revisited","volume":"58","author":"Gao","year":"2015","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180328152220_bxx031C14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2016.03.032","article-title":"Continuous leakage-resilient certificate-based encryption","volume":"355-356","author":"Li","year":"2016","journal-title":"Inf. Sci. (Ny)."},{"key":"key\n\t\t\t\t20180328152220_bxx031C15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jss.2015.05.066","article-title":"Certificate-based encryption resilient to key leakage","volume":"116","author":"Yu","year":"2016","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180328152220_bxx031C16","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1016\/j.ins.2016.08.082","article-title":"A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model","volume":"372","author":"Lu","year":"2016","journal-title":"Inf. Sci. (Ny)."},{"year":"2004","author":"Kang","key":"key\n\t\t\t\t20180328152220_bxx031C17"},{"year":"2007","author":"Au","key":"key\n\t\t\t\t20180328152220_bxx031C18"},{"year":"2008","author":"Liu","key":"key\n\t\t\t\t20180328152220_bxx031C19"},{"key":"key\n\t\t\t\t20180328152220_bxx031C20","first-page":"1659","article-title":"Certificate-based signatures revisited","volume":"15","author":"Wu","year":"2009","journal-title":"J. Univers. Comput. Sci."},{"year":"2009","author":"Liu","key":"key\n\t\t\t\t20180328152220_bxx031C21"},{"key":"key\n\t\t\t\t20180328152220_bxx031C22","doi-asserted-by":"crossref","first-page":"421","DOI":"10.3233\/JCS-2009-0366","article-title":"Constructions of certificate-based signature secure against key replacement attacks","volume":"18","author":"Li","year":"2010","journal-title":"J. Comput. Secur."},{"year":"2011","author":"Liu","key":"key\n\t\t\t\t20180328152220_bxx031C23"},{"key":"key\n\t\t\t\t20180328152220_bxx031C24","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.jss.2011.08.014","article-title":"An efficient short certificate-based signature scheme","volume":"85","author":"Li","year":"2012","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180328152220_bxx031C25","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.ins.2013.01.013","article-title":"Provably secure certificate-based signature scheme without pairings","volume":"233","author":"Li","year":"2013","journal-title":"Inf. Sci. (Ny)."},{"key":"key\n\t\t\t\t20180328152220_bxx031C26","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1093\/comjnl\/bxt141","article-title":"A forward-secure certificate-based signature scheme","volume":"58","author":"Li","year":"2015","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180328152220_bxx031C27","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1049\/iet-ifs.2015.0188","article-title":"An improved certificate-based signature scheme without random oracles","volume":"10","author":"Lu","year":"2016","journal-title":"IET Inf. Secur."},{"key":"key\n\t\t\t\t20180328152220_bxx031C28","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM."},{"year":"1989","author":"Desmedt","key":"key\n\t\t\t\t20180328152220_bxx031C29"},{"year":"1991","author":"Ostrovsky","key":"key\n\t\t\t\t20180328152220_bxx031C30"},{"year":"1997","author":"Anderson","key":"key\n\t\t\t\t20180328152220_bxx031C31"},{"year":"2003","author":"Canetti","key":"key\n\t\t\t\t20180328152220_bxx031C32"},{"year":"2002","author":"Dodis","key":"key\n\t\t\t\t20180328152220_bxx031C33"},{"year":"2003","author":"Dodis","key":"key\n\t\t\t\t20180328152220_bxx031C34"},{"year":"2002","author":"Itkis","key":"key\n\t\t\t\t20180328152220_bxx031C35"},{"year":"2003","author":"Dodis","key":"key\n\t\t\t\t20180328152220_bxx031C36"},{"year":"2005","author":"Hanaoka","key":"key\n\t\t\t\t20180328152220_bxx031C37"},{"year":"2006","author":"Hanaoka","key":"key\n\t\t\t\t20180328152220_bxx031C38"},{"key":"key\n\t\t\t\t20180328152220_bxx031C39","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s00200-005-0183-y","article-title":"Protecting against key exposure: strongly key-insulated encryption with optimal threshold","volume":"16","author":"Bellare","year":"2006","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"year":"2007","author":"Libert","key":"key\n\t\t\t\t20180328152220_bxx031C40"},{"year":"2008","author":"Weng","key":"key\n\t\t\t\t20180328152220_bxx031C41"},{"year":"2006","author":"Zhou","key":"key\n\t\t\t\t20180328152220_bxx031C42"},{"year":"2006","author":"Weng","key":"key\n\t\t\t\t20180328152220_bxx031C43"},{"year":"2008","author":"Ohtake","key":"key\n\t\t\t\t20180328152220_bxx031C44"},{"key":"key\n\t\t\t\t20180328152220_bxx031C45","first-page":"170","article-title":"Solutions to key exposure problem in ring signature","volume":"6","author":"Liu","year":"2008","journal-title":"Int. J. Netw. Secur."},{"key":"key\n\t\t\t\t20180328152220_bxx031C46","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1631\/jzus.A0820714","article-title":"Certificateless key-insulated signature without random oracles","volume":"10","author":"Wan","year":"2009","journal-title":"J. Zhejiang Univ. Sci. A"},{"key":"key\n\t\t\t\t20180328152220_bxx031C47","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s12204-011-1191-7","article-title":"Certificateless strong key-insulated signature without random oracles","volume":"16","author":"Wan","year":"2011","journal-title":"J. Shanghai Jiaotong Univ. (Sci.)"},{"key":"key\n\t\t\t\t20180328152220_bxx031C48","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s12243-015-0461-z","article-title":"Strongly secure certificateless key-insulated signature secure in the standard model","volume":"70","author":"Chen","year":"2015","journal-title":"Ann. Telecommun."},{"key":"key\n\t\t\t\t20180328152220_bxx031C49","doi-asserted-by":"crossref","first-page":"353","DOI":"10.3934\/amc.2015.9.353","article-title":"An improved certificateless strong key-insulated signature scheme in the standard model","volume":"9","author":"Lu","year":"2015","journal-title":"Adv. Math. Commun."},{"year":"2016","author":"He","key":"key\n\t\t\t\t20180328152220_bxx031C50"},{"year":"2012","author":"Du","key":"key\n\t\t\t\t20180328152220_bxx031C51"},{"key":"key\n\t\t\t\t20180328152220_bxx031C52","first-page":"1246","article-title":"A pairing-free key-insulated certificate-based signature scheme with provable security","volume":"9","author":"Xiong","year":"2015","journal-title":"KSII Trans. Int. Inf. Syst."},{"year":"1993","author":"Bellare","key":"key\n\t\t\t\t20180328152220_bxx031C53"},{"key":"key\n\t\t\t\t20180328152220_bxx031C54","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1008731.1008734","article-title":"The random oracle methodology, revisited","volume":"51","author":"Canetti","year":"2004","journal-title":"J. ACM"},{"key":"key\n\t\t\t\t20180328152220_bxx031C55","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1093\/comjnl\/bxv115","article-title":"Certificate-based key-insulated signature in the standard model","volume":"59","author":"Li","year":"2016","journal-title":"Comput. J."},{"year":"2007","author":"Au","key":"key\n\t\t\t\t20180328152220_bxx031C56"},{"year":"2004","author":"Zhang","key":"key\n\t\t\t\t20180328152220_bxx031C57"},{"year":"2006","author":"Lynn","key":"key\n\t\t\t\t20180328152220_bxx031C58"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/12\/1729\/22297459\/bxx031.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T18:08:57Z","timestamp":1589738937000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/60\/12\/1729\/3091766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,28]]},"references-count":58,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,3,28]]},"published-print":{"date-parts":[[2017,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx031","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2017,12]]},"published":{"date-parts":[[2017,3,28]]}}}