A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity

Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:PloS one 2016-11, Vol.11 (11), p.e0166173-e0166173
Hauptverfasser: Pang, Liaojun, Yan, Xuxia, Zhao, Huiyang, Hu, Yufei, Li, Huixian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page e0166173
container_issue 11
container_start_page e0166173
container_title PloS one
container_volume 11
creator Pang, Liaojun
Yan, Xuxia
Zhao, Huiyang
Hu, Yufei
Li, Huixian
description Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.
doi_str_mv 10.1371/journal.pone.0166173
format Article
fullrecord <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_1858088774</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A471845708</galeid><doaj_id>oai_doaj_org_article_2cb8d8c8e7294ee4858aabe12f39794e</doaj_id><sourcerecordid>A471845708</sourcerecordid><originalsourceid>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</originalsourceid><addsrcrecordid>eNqNk02P0zAQhiMEYpfCP0AQCQnBocVfid0LUqn4qLSw0ha4Wo4zab1y4hI7hf57HJpdNWgPKx9iTZ5557XHkyTPMZphyvG7a9e1jbKznWtghnCeY04fJOd4Tsk0J4g-PNmfJU-8v0YooyLPHydnhAtKMMrOkw-L9Jvbg02_djaY6RVoMHto07XZNLo97IJxTbrWW6gh_W3CNl26emchQLpoXHOoTTg8TR5Vynp4NnwnyY9PH78vv0wvLj-vlouLqeYkC1MihFY6OsgwqwpFq4KVJQItdJFrWuUKC0ZKBsCIYAjjKmOcVxrmGRQVwYJOkpdH3Z11Xg7H9xKLTCAhOGeRWB2J0qlruWtNrdqDdMrIfwHXbqRqg9EWJNGFKIUWwMm8rxlFlCoAk4rOeYxErfdDta6oodTQhFbZkej4T2O2cuP2MsOIUdHbfTMItO5XBz7I2ngN1qoGXNf7ZjlDPLbhHiidY0xE7N8kefUfevdFDNRGxbOapnLRou5F5YLxWDnjqHc4u4OKq4Ta6PisKhPjo4S3o4TIBPgTNqrzXq7WV_dnL3-O2dcn7BaUDVvvbNc_Pj8G2RHUrfO-heq2HxjJfipubkP2UyGHqYhpL057eZt0Mwb0LzPRBks</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1858088774</pqid></control><display><type>article</type><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</creator><creatorcontrib>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</creatorcontrib><description>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0166173</identifier><identifier>PMID: 27832105</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Algorithms ; Biology and Life Sciences ; Communication ; Computer and Information Sciences ; Computer Communication Networks ; Computer Security ; Confidentiality ; Data encryption ; Digital signatures ; Efficiency ; Encryption ; Health Information Exchange ; Health Smart Cards - methods ; Humans ; Interpolation ; Life sciences ; Network security ; Physical Sciences ; Polynomials ; Privacy ; Receivers ; Reproducibility of Results ; Research and Analysis Methods ; Researchers ; Telecommunications equipment</subject><ispartof>PloS one, 2016-11, Vol.11 (11), p.e0166173-e0166173</ispartof><rights>COPYRIGHT 2016 Public Library of Science</rights><rights>2016 Pang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2016 Pang et al 2016 Pang et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</citedby><cites>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC5104388/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC5104388/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23845,27901,27902,53766,53768,79342,79343</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/27832105$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Pang, Liaojun</creatorcontrib><creatorcontrib>Yan, Xuxia</creatorcontrib><creatorcontrib>Zhao, Huiyang</creatorcontrib><creatorcontrib>Hu, Yufei</creatorcontrib><creatorcontrib>Li, Huixian</creatorcontrib><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</description><subject>Algorithms</subject><subject>Biology and Life Sciences</subject><subject>Communication</subject><subject>Computer and Information Sciences</subject><subject>Computer Communication Networks</subject><subject>Computer Security</subject><subject>Confidentiality</subject><subject>Data encryption</subject><subject>Digital signatures</subject><subject>Efficiency</subject><subject>Encryption</subject><subject>Health Information Exchange</subject><subject>Health Smart Cards - methods</subject><subject>Humans</subject><subject>Interpolation</subject><subject>Life sciences</subject><subject>Network security</subject><subject>Physical Sciences</subject><subject>Polynomials</subject><subject>Privacy</subject><subject>Receivers</subject><subject>Reproducibility of Results</subject><subject>Research and Analysis Methods</subject><subject>Researchers</subject><subject>Telecommunications equipment</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNqNk02P0zAQhiMEYpfCP0AQCQnBocVfid0LUqn4qLSw0ha4Wo4zab1y4hI7hf57HJpdNWgPKx9iTZ5557XHkyTPMZphyvG7a9e1jbKznWtghnCeY04fJOd4Tsk0J4g-PNmfJU-8v0YooyLPHydnhAtKMMrOkw-L9Jvbg02_djaY6RVoMHto07XZNLo97IJxTbrWW6gh_W3CNl26emchQLpoXHOoTTg8TR5Vynp4NnwnyY9PH78vv0wvLj-vlouLqeYkC1MihFY6OsgwqwpFq4KVJQItdJFrWuUKC0ZKBsCIYAjjKmOcVxrmGRQVwYJOkpdH3Z11Xg7H9xKLTCAhOGeRWB2J0qlruWtNrdqDdMrIfwHXbqRqg9EWJNGFKIUWwMm8rxlFlCoAk4rOeYxErfdDta6oodTQhFbZkej4T2O2cuP2MsOIUdHbfTMItO5XBz7I2ngN1qoGXNf7ZjlDPLbhHiidY0xE7N8kefUfevdFDNRGxbOapnLRou5F5YLxWDnjqHc4u4OKq4Ta6PisKhPjo4S3o4TIBPgTNqrzXq7WV_dnL3-O2dcn7BaUDVvvbNc_Pj8G2RHUrfO-heq2HxjJfipubkP2UyGHqYhpL057eZt0Mwb0LzPRBks</recordid><startdate>20161110</startdate><enddate>20161110</enddate><creator>Pang, Liaojun</creator><creator>Yan, Xuxia</creator><creator>Zhao, Huiyang</creator><creator>Hu, Yufei</creator><creator>Li, Huixian</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope></search><sort><creationdate>20161110</creationdate><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><author>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>Biology and Life Sciences</topic><topic>Communication</topic><topic>Computer and Information Sciences</topic><topic>Computer Communication Networks</topic><topic>Computer Security</topic><topic>Confidentiality</topic><topic>Data encryption</topic><topic>Digital signatures</topic><topic>Efficiency</topic><topic>Encryption</topic><topic>Health Information Exchange</topic><topic>Health Smart Cards - methods</topic><topic>Humans</topic><topic>Interpolation</topic><topic>Life sciences</topic><topic>Network security</topic><topic>Physical Sciences</topic><topic>Polynomials</topic><topic>Privacy</topic><topic>Receivers</topic><topic>Reproducibility of Results</topic><topic>Research and Analysis Methods</topic><topic>Researchers</topic><topic>Telecommunications equipment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pang, Liaojun</creatorcontrib><creatorcontrib>Yan, Xuxia</creatorcontrib><creatorcontrib>Zhao, Huiyang</creatorcontrib><creatorcontrib>Hu, Yufei</creatorcontrib><creatorcontrib>Li, Huixian</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pang, Liaojun</au><au>Yan, Xuxia</au><au>Zhao, Huiyang</au><au>Hu, Yufei</au><au>Li, Huixian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2016-11-10</date><risdate>2016</risdate><volume>11</volume><issue>11</issue><spage>e0166173</spage><epage>e0166173</epage><pages>e0166173-e0166173</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>27832105</pmid><doi>10.1371/journal.pone.0166173</doi><tpages>e0166173</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1932-6203
ispartof PloS one, 2016-11, Vol.11 (11), p.e0166173-e0166173
issn 1932-6203
1932-6203
language eng
recordid cdi_plos_journals_1858088774
source MEDLINE; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS)
subjects Algorithms
Biology and Life Sciences
Communication
Computer and Information Sciences
Computer Communication Networks
Computer Security
Confidentiality
Data encryption
Digital signatures
Efficiency
Encryption
Health Information Exchange
Health Smart Cards - methods
Humans
Interpolation
Life sciences
Network security
Physical Sciences
Polynomials
Privacy
Receivers
Reproducibility of Results
Research and Analysis Methods
Researchers
Telecommunications equipment
title A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T05%3A17%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Multi-Receiver%20Signcryption%20Scheme%20with%20Complete%20Anonymity&rft.jtitle=PloS%20one&rft.au=Pang,%20Liaojun&rft.date=2016-11-10&rft.volume=11&rft.issue=11&rft.spage=e0166173&rft.epage=e0166173&rft.pages=e0166173-e0166173&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0166173&rft_dat=%3Cgale_plos_%3EA471845708%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1858088774&rft_id=info:pmid/27832105&rft_galeid=A471845708&rft_doaj_id=oai_doaj_org_article_2cb8d8c8e7294ee4858aabe12f39794e&rfr_iscdi=true