{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:31Z","timestamp":1725558991850},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258629"},{"type":"electronic","value":"9783540320456"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424857_78","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T19:49:45Z","timestamp":1279050585000},"page":"711-718","source":"Crossref","is-referenced-by-count":2,"title":["Security Flaws in Several Group Signatures Proposed by Popescu"],"prefix":"10.1007","author":[{"given":"Guilin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Sihan","family":"Qing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 255\u2013270. Springer, Heidelberg (2000)"},{"key":"78_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-48390-X_15","volume-title":"Financial Cryptography","author":"G. Ateniese","year":"1999","unstructured":"Ateniese, G., Tsudik, G.: Some open issues and new directions in group signature schemes. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 196\u2013211. Springer, Heidelberg (1999)"},{"key":"78_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Effient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"key":"78_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-49649-1_14","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"J. Camenisch","year":"1998","unstructured":"Camenisch, J., Michels, M.: A group signature scheme with improved efficiency. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 160\u2013174. Springer, Heidelberg (1998)"},{"key":"78_CR5","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Michels, M.: A group signature scheme based on an RSA-variant. Technical Report RS-98-27, BRICS, University of Aarhus, An earlier version appears in [4] (November 1998)","DOI":"10.7146\/brics.v5i27.19433"},{"key":"78_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0053427","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"D. Chaum","year":"1995","unstructured":"Chaum, D., van Heyst, E.: Group Signatures. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 257\u2013265. Springer, Heidelberg (1995)"},{"key":"78_CR7","first-page":"123","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"T. Okamoto","year":"1985","unstructured":"Okamoto, T., Shiraishi, A.: A fast signature scheme based on quadratic inequalities. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 123\u2013132. IEEE Computer Society Press, Los Alamitos (1985)"},{"key":"78_CR8","first-page":"325","volume-title":"Proc. of Protocols for Multimedia Systems, PROMS 2000","author":"C. Popescu","year":"2000","unstructured":"Popescu, C.: Group signature schemes based on the difficulty of computation of approximate e-th roots. In: Proc. of Protocols for Multimedia Systems, PROMS 2000, pp. 325\u2013331. Cracow, Poland (2000)"},{"issue":"1","key":"78_CR9","first-page":"7","volume":"10","author":"C. Popescu","year":"2001","unstructured":"Popescu, C.: An efficient group signature scheme for large groups. Studies in Informatics and Control Journal\u00a010(1), 7\u201314 (2001), \n                    \n                      http:\/\/www.ici.ro\/ici\/revista\/sic2001-1\/art1.htm","journal-title":"Studies in Informatics and Control Journal"},{"key":"78_CR10","unstructured":"Popescu, C.: A group blind signature scheme based on the Okamoto-Shiraishi assumption. Romanian Journal of Information Science and Technology\u00a04(5) (2002)"},{"key":"78_CR11","unstructured":"Popescu, C., Noje, D., Bede, B., Mang, I.: A group signature scheme with revocation. In: Proc. of 4th EURSIP Conference focused on Video\/Image Processing and Multimedia Communications EC-VIP-MC 2003, Zagreb, Coratia, 2-5 July, pp. 245\u2013250. IEEE Computer Society, Los Alamitos (2003), available via IEEExplore,\n                    \n                      http:\/\/ieeexplore.ieee.org\/"},{"key":"78_CR12","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/501983.502015","volume-title":"ACM CCS 2001","author":"D.X. Song","year":"2001","unstructured":"Song, D.X.: Practical forward secure group signature schemes. In: ACM CCS 2001, pp. 225\u2013234. ACM press, New York (2001)"},{"key":"78_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-39927-8_7","volume-title":"Information and Communications Security","author":"G. Wang","year":"2003","unstructured":"Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security remarks on a group signature scheme with member deletion. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 72\u201383. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424857_78","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:09:58Z","timestamp":1558282198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424857_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258629","9783540320456"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11424857_78","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}