A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's...
Gespeichert in:
Veröffentlicht in: | PloS one 2016-11, Vol.11 (11), p.e0166173-e0166173 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | e0166173 |
---|---|
container_issue | 11 |
container_start_page | e0166173 |
container_title | PloS one |
container_volume | 11 |
creator | Pang, Liaojun Yan, Xuxia Zhao, Huiyang Hu, Yufei Li, Huixian |
description | Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided. |
doi_str_mv | 10.1371/journal.pone.0166173 |
format | Article |
fullrecord | <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_1858088774</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A471845708</galeid><doaj_id>oai_doaj_org_article_2cb8d8c8e7294ee4858aabe12f39794e</doaj_id><sourcerecordid>A471845708</sourcerecordid><originalsourceid>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</originalsourceid><addsrcrecordid>eNqNk02P0zAQhiMEYpfCP0AQCQnBocVfid0LUqn4qLSw0ha4Wo4zab1y4hI7hf57HJpdNWgPKx9iTZ5557XHkyTPMZphyvG7a9e1jbKznWtghnCeY04fJOd4Tsk0J4g-PNmfJU-8v0YooyLPHydnhAtKMMrOkw-L9Jvbg02_djaY6RVoMHto07XZNLo97IJxTbrWW6gh_W3CNl26emchQLpoXHOoTTg8TR5Vynp4NnwnyY9PH78vv0wvLj-vlouLqeYkC1MihFY6OsgwqwpFq4KVJQItdJFrWuUKC0ZKBsCIYAjjKmOcVxrmGRQVwYJOkpdH3Z11Xg7H9xKLTCAhOGeRWB2J0qlruWtNrdqDdMrIfwHXbqRqg9EWJNGFKIUWwMm8rxlFlCoAk4rOeYxErfdDta6oodTQhFbZkej4T2O2cuP2MsOIUdHbfTMItO5XBz7I2ngN1qoGXNf7ZjlDPLbhHiidY0xE7N8kefUfevdFDNRGxbOapnLRou5F5YLxWDnjqHc4u4OKq4Ta6PisKhPjo4S3o4TIBPgTNqrzXq7WV_dnL3-O2dcn7BaUDVvvbNc_Pj8G2RHUrfO-heq2HxjJfipubkP2UyGHqYhpL057eZt0Mwb0LzPRBks</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1858088774</pqid></control><display><type>article</type><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</creator><creatorcontrib>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</creatorcontrib><description>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0166173</identifier><identifier>PMID: 27832105</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Algorithms ; Biology and Life Sciences ; Communication ; Computer and Information Sciences ; Computer Communication Networks ; Computer Security ; Confidentiality ; Data encryption ; Digital signatures ; Efficiency ; Encryption ; Health Information Exchange ; Health Smart Cards - methods ; Humans ; Interpolation ; Life sciences ; Network security ; Physical Sciences ; Polynomials ; Privacy ; Receivers ; Reproducibility of Results ; Research and Analysis Methods ; Researchers ; Telecommunications equipment</subject><ispartof>PloS one, 2016-11, Vol.11 (11), p.e0166173-e0166173</ispartof><rights>COPYRIGHT 2016 Public Library of Science</rights><rights>2016 Pang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2016 Pang et al 2016 Pang et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</citedby><cites>FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC5104388/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC5104388/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23845,27901,27902,53766,53768,79342,79343</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/27832105$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Pang, Liaojun</creatorcontrib><creatorcontrib>Yan, Xuxia</creatorcontrib><creatorcontrib>Zhao, Huiyang</creatorcontrib><creatorcontrib>Hu, Yufei</creatorcontrib><creatorcontrib>Li, Huixian</creatorcontrib><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</description><subject>Algorithms</subject><subject>Biology and Life Sciences</subject><subject>Communication</subject><subject>Computer and Information Sciences</subject><subject>Computer Communication Networks</subject><subject>Computer Security</subject><subject>Confidentiality</subject><subject>Data encryption</subject><subject>Digital signatures</subject><subject>Efficiency</subject><subject>Encryption</subject><subject>Health Information Exchange</subject><subject>Health Smart Cards - methods</subject><subject>Humans</subject><subject>Interpolation</subject><subject>Life sciences</subject><subject>Network security</subject><subject>Physical Sciences</subject><subject>Polynomials</subject><subject>Privacy</subject><subject>Receivers</subject><subject>Reproducibility of Results</subject><subject>Research and Analysis Methods</subject><subject>Researchers</subject><subject>Telecommunications equipment</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNqNk02P0zAQhiMEYpfCP0AQCQnBocVfid0LUqn4qLSw0ha4Wo4zab1y4hI7hf57HJpdNWgPKx9iTZ5557XHkyTPMZphyvG7a9e1jbKznWtghnCeY04fJOd4Tsk0J4g-PNmfJU-8v0YooyLPHydnhAtKMMrOkw-L9Jvbg02_djaY6RVoMHto07XZNLo97IJxTbrWW6gh_W3CNl26emchQLpoXHOoTTg8TR5Vynp4NnwnyY9PH78vv0wvLj-vlouLqeYkC1MihFY6OsgwqwpFq4KVJQItdJFrWuUKC0ZKBsCIYAjjKmOcVxrmGRQVwYJOkpdH3Z11Xg7H9xKLTCAhOGeRWB2J0qlruWtNrdqDdMrIfwHXbqRqg9EWJNGFKIUWwMm8rxlFlCoAk4rOeYxErfdDta6oodTQhFbZkej4T2O2cuP2MsOIUdHbfTMItO5XBz7I2ngN1qoGXNf7ZjlDPLbhHiidY0xE7N8kefUfevdFDNRGxbOapnLRou5F5YLxWDnjqHc4u4OKq4Ta6PisKhPjo4S3o4TIBPgTNqrzXq7WV_dnL3-O2dcn7BaUDVvvbNc_Pj8G2RHUrfO-heq2HxjJfipubkP2UyGHqYhpL057eZt0Mwb0LzPRBks</recordid><startdate>20161110</startdate><enddate>20161110</enddate><creator>Pang, Liaojun</creator><creator>Yan, Xuxia</creator><creator>Zhao, Huiyang</creator><creator>Hu, Yufei</creator><creator>Li, Huixian</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope></search><sort><creationdate>20161110</creationdate><title>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</title><author>Pang, Liaojun ; Yan, Xuxia ; Zhao, Huiyang ; Hu, Yufei ; Li, Huixian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c725t-288cac538514fba3fb4dd0ec8cb6c3f6a1842d4ee4284011f5477fce95ebf2183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>Biology and Life Sciences</topic><topic>Communication</topic><topic>Computer and Information Sciences</topic><topic>Computer Communication Networks</topic><topic>Computer Security</topic><topic>Confidentiality</topic><topic>Data encryption</topic><topic>Digital signatures</topic><topic>Efficiency</topic><topic>Encryption</topic><topic>Health Information Exchange</topic><topic>Health Smart Cards - methods</topic><topic>Humans</topic><topic>Interpolation</topic><topic>Life sciences</topic><topic>Network security</topic><topic>Physical Sciences</topic><topic>Polynomials</topic><topic>Privacy</topic><topic>Receivers</topic><topic>Reproducibility of Results</topic><topic>Research and Analysis Methods</topic><topic>Researchers</topic><topic>Telecommunications equipment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pang, Liaojun</creatorcontrib><creatorcontrib>Yan, Xuxia</creatorcontrib><creatorcontrib>Zhao, Huiyang</creatorcontrib><creatorcontrib>Hu, Yufei</creatorcontrib><creatorcontrib>Li, Huixian</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing & Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pang, Liaojun</au><au>Yan, Xuxia</au><au>Zhao, Huiyang</au><au>Hu, Yufei</au><au>Li, Huixian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2016-11-10</date><risdate>2016</risdate><volume>11</volume><issue>11</issue><spage>e0166173</spage><epage>e0166173</epage><pages>e0166173-e0166173</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>27832105</pmid><doi>10.1371/journal.pone.0166173</doi><tpages>e0166173</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2016-11, Vol.11 (11), p.e0166173-e0166173 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_1858088774 |
source | MEDLINE; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS) |
subjects | Algorithms Biology and Life Sciences Communication Computer and Information Sciences Computer Communication Networks Computer Security Confidentiality Data encryption Digital signatures Efficiency Encryption Health Information Exchange Health Smart Cards - methods Humans Interpolation Life sciences Network security Physical Sciences Polynomials Privacy Receivers Reproducibility of Results Research and Analysis Methods Researchers Telecommunications equipment |
title | A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T05%3A17%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Multi-Receiver%20Signcryption%20Scheme%20with%20Complete%20Anonymity&rft.jtitle=PloS%20one&rft.au=Pang,%20Liaojun&rft.date=2016-11-10&rft.volume=11&rft.issue=11&rft.spage=e0166173&rft.epage=e0166173&rft.pages=e0166173-e0166173&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0166173&rft_dat=%3Cgale_plos_%3EA471845708%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1858088774&rft_id=info:pmid/27832105&rft_galeid=A471845708&rft_doaj_id=oai_doaj_org_article_2cb8d8c8e7294ee4858aabe12f39794e&rfr_iscdi=true |