{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:44:39Z","timestamp":1742953479200,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319403663"},{"type":"electronic","value":"9783319403670"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40367-0_2","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T18:53:42Z","timestamp":1467226422000},"page":"21-36","source":"Crossref","is-referenced-by-count":2,"title":["Proxy Signature with Revocation"],"prefix":"10.1007","author":[{"given":"Shengmin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Sha","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/3-540-36504-4_14","volume-title":"Financial Cryptography","author":"G Ateniese","year":"2003","unstructured":"Ateniese, G., Song, D., Tsudik, G.: Quasi-efficient revocation of group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 183\u2013197. Springer, Heidelberg (2003)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"issue":"4","key":"2_CR4","doi-asserted-by":"crossref","first-page":"455","DOI":"10.15388\/Informatica.2004.072","volume":"15","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: An efficient proxy signature scheme with revocation. Informatica 15(4), 455\u2013464 (2004)","journal-title":"Informatica"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-540-44993-5_5","volume-title":"Digital Rights Management","author":"Y Dodis","year":"2003","unstructured":"Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61\u201380. Springer, Heidelberg (2003)"},{"issue":"2","key":"2_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D Halevy","year":"2002","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47\u201360. Springer, Heidelberg (2002)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/11596042_50","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops","author":"X Huang","year":"2005","unstructured":"Huang, X., Mu, Y., Susilo, W., Zhang, F., Chen, X.: A short proxy signature scheme: efficient authentication in the ubiquitous world. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 480\u2013489. Springer, Heidelberg (2005)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/11943952_40","volume-title":"Mobile Ad-hoc and Sensor Networks","author":"X Huang","year":"2006","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473\u2013484. Springer, Heidelberg (2006)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Information and Communications Security, pp. 223\u2013232 (1997)","DOI":"10.1007\/BFb0028478"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/3-540-47719-5_37","volume-title":"Information Security and Privacy","author":"B Lee","year":"2001","unstructured":"Lee, B., Kim, H.-S., Kim, K.: Secure mobile agent using strong non-designated proxy signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 474\u2013486. Springer, Heidelberg (2001)"},{"key":"2_CR12","unstructured":"Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603\u2013608 (2001)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","first-page":"591","volume-title":"Parallel and Distributed Computing: Applications and Technologies","author":"X Li","year":"2004","unstructured":"Li, X., Chen, K., Li, S.: Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Liew, K.-M., Shen, H., See, S., Cai, W. (eds.) PDCAT 2004. LNCS, vol. 3320, pp. 591\u2013595. Springer, Heidelberg (2004)"},{"issue":"3","key":"2_CR14","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1016\/j.comcom.2010.05.015","volume":"34","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Yupu, H., Zhang, X., Ma, H.: Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3), 494\u2013501 (2011)","journal-title":"Comput. Commun."},{"issue":"3","key":"2_CR15","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1016\/j.amc.2003.12.039","volume":"161","author":"EJ-L Lu","year":"2005","unstructured":"Lu, E.J.-L., Hwang, M.-S., Huang, C.-J.: A new proxy signature scheme with revocation. Appl. Math. Comput. 161(3), 799\u2013806 (2005)","journal-title":"Appl. Math. Comput."},{"issue":"9","key":"2_CR16","first-page":"1338","volume":"79","author":"M Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338\u20131354 (1996)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48\u201357. ACM (1996)","DOI":"10.1145\/238168.238185"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/11537878_22","volume-title":"Trust, Privacy, and Security in Digital Business","author":"S-H Seo","year":"2005","unstructured":"Seo, S.-H., Shim, K.-A., Lee, S.-H.: A mediated proxy signature scheme with fast revocation for electronic transactions. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 216\u2013225. Springer, Heidelberg (2005)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Sun, H.-M.: Design of time-stamped proxy signatures with traceable receivers. In: IEE Proceedings-Computers and Digital Techniques, vol. 147, no. 6, pp. 462\u2013466 (2000)","DOI":"10.1049\/ip-cdt:20000888"},{"issue":"5","key":"2_CR21","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.future.2004.01.002","volume":"20","author":"S-F Tzeng","year":"2004","unstructured":"Tzeng, S.-F., Yang, C.-Y., Hwang, M.-S.: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Gener. Comput. Syst. 20(5), 887\u2013893 (2004)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"2_CR22","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1049\/el:20000422","volume":"36","author":"L Yi","year":"2000","unstructured":"Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527\u2013528 (2000)","journal-title":"Electron. Lett."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40367-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T03:35:49Z","timestamp":1600832149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40367-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319403663","9783319403670"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40367-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}