{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:38:13Z","timestamp":1725550693285},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540289388"},{"type":"electronic","value":"9783540320661"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11554868_8","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:49:02Z","timestamp":1127832542000},"page":"99-115","source":"Crossref","is-referenced-by-count":4,"title":["Identity Based Delegation Network"],"prefix":"10.1007","author":[{"given":"Sherman S. M.","family":"Chow","sequence":"first","affiliation":[]},{"given":"Richard W. C.","family":"Lui","sequence":"additional","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop","author":"T. Aura","year":"1998","unstructured":"Aura, T.: On the Structure of Delegation Networks. In: PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bakker, A., van Steen, M., Tanenbaum, A.S.: A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. In: Proceedings of IEEE International Symposium on Network Computing and Applications (NCA 2001), Cambridge, MA, October 8-10 (2001)","DOI":"10.1109\/NCA.2001.962516"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., Zhang, F., Kim, K.: ID-based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. In: KIISC conference (2003)","DOI":"10.1007\/3-540-45067-X_27"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-31815-6_15","volume-title":"Information Security Applications","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M.: Verifiable Pairing and Its Applications. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 170\u2013187. Springer, Heidelberg (2005)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 229\u2013235. Springer, Heidelberg (2000)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., Franz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, Simple Public Key Certificate, SPKI Examples. Internet draft, SPKI Working Group, Internet Engineering Task Force (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/288090.288111","volume-title":"Proceedings of the Fifth ACM conference on Computer and Communications Security","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proceedings of the Fifth ACM conference on Computer and Communications Security, pp. 83\u201392. ACM Press, New York (1998)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-48970-3_11","volume-title":"Information Security and Privacy","author":"H. Ghodosi","year":"1999","unstructured":"Ghodosi, H., Pieprzyk, J.: Repudiation of Cheating and Non-Repudiation of Zhang\u2019s Proxy Signature Schemes. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, p. 129. Springer, Heidelberg (1999)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-45126-6_21","volume-title":"Financial Cryptography","author":"J. Herranz","year":"2003","unstructured":"Herranz, J., S\u00e1ez, G.: Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 286\u2013302. Springer, Heidelberg (2003)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-30556-9_28","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"J. Herranz","year":"2004","unstructured":"Herranz, J., S\u00e1ez, G.: Revisiting Fully Distributed Proxy Signature Schemes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 356\u2013370. Springer, Heidelberg (2004)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient Identity Based Signature Schemes based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0096-3003(02)00650-1","volume":"147","author":"S.-J. Hwang","year":"2004","unstructured":"Hwang, S.-J., Chen, C.-C.: New Multi-Proxy Multi-Signature Schemes. Applied Mathematics and Computation\u00a0147(1), 57\u201367 (2004)","journal-title":"Applied Mathematics and Computation"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028478","volume-title":"Information and Communications Security","author":"S. Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334. Springer, Heidelberg (1997)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Security and Privacy","author":"B. Lee","year":"2001","unstructured":"Lee, B., Kim, H., Kim, K.: Secure Mobile Agent Using Strong Non-Designated Proxy Signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, p. 1. Springer, Heidelberg (2001)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/BFb0053752","volume-title":"Information Security and Privacy","author":"N.-Y. Lee","year":"1998","unstructured":"Lee, N.-Y., Hwang, T., Wang, C.-H.: On Zhang\u2019s Nonrepudiable Proxy Signature Schemes. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, p. 415. Springer, Heidelberg (1998)"},{"key":"8_CR18","volume-title":"Information Security for Global Information Infrastructures","author":"J. Leiwo","year":"2000","unstructured":"Leiwo, J., Hanle, C., Homburg, P., Tanenbaum, A.S.: Disallowing Unauthorized State Changes of Distributed Shared Objects. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"8_CR19","unstructured":"Libert, B., Quisquater, J.-J.: The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004\/102 (2004), Available at http:\/\/eprint.iacr.org"},{"key":"8_CR20","unstructured":"Lin, C.-Y., Wu, T.-C., Zhang, F.: A Structured Multisignature Scheme from the Gap Diffie-Hellman Group. Cryptology ePrint Archive, Report 2003\/090 (2003), Available at http:\/\/eprint.iacr.org"},{"key":"8_CR21","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans. Fundamentals\u00a0E79-A(9) (September 1996)"},{"key":"8_CR22","unstructured":"Clifford Neuman, B.: Proxy-Based Authorization and Accounting for Distributed Systems. In: Thirteenth International Conference on Distributed Computing Systems, pp. 283\u2013291 (1993)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/3-540-47790-X_21","volume-title":"Information Security","author":"T. Okamoto","year":"1999","unstructured":"Okamoto, T., Tada, M., Okamoto, E.: Extended Proxy Signatures for Smart Cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol.\u00a01729, p. 247. Springer, Heidelberg (1999)"},{"issue":"3","key":"8_CR24","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology: The Journal of the International Association for Cryptologic Research\u00a013(3), 361\u2013396 (2000)","journal-title":"Journal of Cryptology: The Journal of the International Association for Cryptologic Research"},{"key":"8_CR25","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on Pairing over Elliptic Curve. In: Proceedings of Symposium on Cryptography and Information Security (SCIS 2000) C-20 (2000)"},{"key":"8_CR26","unstructured":"Seo, S.-H., Lee, S.-H.: New Nominative Proxy Signature Scheme for Mobile Communication. In: Conference on Security and Protection of Information 2003, Brno, Czech Republic, April 28-30, pp. 149\u2013154 (2003)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"8_CR28","unstructured":"Solinas, J.A.: ID-based Digital Signature Algorithms. Slide Show presented at 7th Workshop on Elliptic Curve Cryptography (ECC 2003) (August 2003)"},{"key":"8_CR29","unstructured":"Sun, H.-M., Hsieh, B.-T., Lin, C.T.: Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme. In: Twelfth National Information Security Conference (ISC 2002) (2002)"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-24691-6_23","volume-title":"Information Security and Cryptology - ICISC 2003","author":"G. Wang","year":"2004","unstructured":"Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 305\u2013319. Springer, Heidelberg (2004); Also available at Cryptology ePrint Archive, Report 2003\/196"},{"key":"8_CR31","unstructured":"Xu, J., Zhang, Z., Feng, D.: ID-Based Proxy Signature Using Bilinear Pairings. Cryptology ePrint Archive, Report 2004\/206 (2004), Available at http:\/\/eprint.iacr.org"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11496618_18","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"H. Yoon","year":"2005","unstructured":"Yoon, H., Cheon, J.H., Kim, Y.: Batch Verifications with ID-Based Signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 233\u2013248. Springer, Heidelberg (2005)"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 312\u2013323. Springer, Heidelberg (2003)"},{"key":"8_CR34","unstructured":"Zhang, K.: Nonrepudiable Proxy Signature Schemes, Available at http:\/\/citeseer.nj.nec.com\/zhang97nonrepudiable.html"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, K.: Threshold Proxy Signature Schemes. In: Proceedings of the First International Information Security Workshop, pp. 282\u2013290 (1997)","DOI":"10.1007\/BFb0030429"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 Mycrypt 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11554868_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:46:59Z","timestamp":1605642419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11554868_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540289388","9783540320661"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/11554868_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}