{"id":"https://openalex.org/W2753269216","doi":"https://doi.org/10.1093/comjnl/bxx081","title":"On the Security of a Pairing-Free Certificateless Signcryption Scheme","display_name":"On the Security of a Pairing-Free Certificateless Signcryption Scheme","publication_year":2017,"publication_date":"2017-08-25","ids":{"openalex":"https://openalex.org/W2753269216","doi":"https://doi.org/10.1093/comjnl/bxx081","mag":"2753269216"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxx081","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx081","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["College of Sciences, North China University of Technology, Beijing 100144, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0001-8674-3988","affiliations":[{"raw_affiliation_string":"College of Sciences, North China University of Technology, Beijing 100144, China","institution_ids":["https://openalex.org/I1456306"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guilin, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089061086","display_name":"Jian Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Mao","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100662562"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.4157,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7256042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"61","issue":"4","first_page":"469","last_page":"471"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9744493961334229},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9393155574798584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6818368434906006},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6810979843139648},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.647580623626709},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.6204169988632202},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.493868887424469},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4577973484992981},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3640000820159912},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2632152736186981},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15224900841712952},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1438521146774292},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06207495927810669}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9744493961334229},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9393155574798584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6818368434906006},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6810979843139648},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.647580623626709},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.6204169988632202},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.493868887424469},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4577973484992981},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3640000820159912},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2632152736186981},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15224900841712952},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1438521146774292},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06207495927810669},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxx081","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx081","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2586483376"],"related_works":["https://openalex.org/W1527397996","https://openalex.org/W2067286885","https://openalex.org/W2523655603","https://openalex.org/W2372417166","https://openalex.org/W2111058478","https://openalex.org/W2370393274","https://openalex.org/W1991914881","https://openalex.org/W4249818391","https://openalex.org/W2009637449","https://openalex.org/W1821799410"],"abstract_inverted_index":{"Unforgeability":[0],"is":[1,40],"an":[2],"important":[3],"security":[4],"property":[5],"in":[6,27,33],"signcryption.":[7],"Recently,":[8],"Yu":[9],"et":[10],"al.":[11],"proposed":[12],"a":[13],"pairing-free":[14],"and":[15,20,46],"secure":[16,26],"certificateless":[17],"signcryption":[18],"scheme":[19,23,39],"demonstrated":[21],"their":[22,38],"was":[24],"provably":[25],"the":[28,43,47],"random":[29],"oracle":[30],"model.":[31],"Unfortunately,":[32],"this":[34],"letter,":[35],"we":[36],"show":[37],"insecure":[41],"against":[42],"malicious":[44,48],"KGC":[45],"sender":[49],"through":[50],"proposing":[51],"two":[52],"concrete":[53],"attacks.":[54]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
