“…Presently, many public-key-based PS schemes [6,[10][11][12][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44][45] are proposed in the random oracle model or standard model, which are based on various mathematical problem assumptions, such as computational Diffie-Hellman (CDH) problem [9,10,28,34,36,42], factoring problem [40], discrete logarithm problem [27,29,30,35] and extended kplus problem [39]. Also, based on identity-based cryptography, many variants of public-key-based PS are proposed [18][19][20][21][22][23][24][46][47][48][49].…”