{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:29:04Z","timestamp":1725564544002},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340775"},{"type":"electronic","value":"9783540340782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751632_28","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T15:00:57Z","timestamp":1147359657000},"page":"262-270","source":"Crossref","is-referenced-by-count":3,"title":["Linkability of a Blind Signature Scheme and Its Improved Scheme"],"prefix":"10.1007","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"JianYu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/11599371_11","volume-title":"Cryptology and Network Security","author":"Z.J. Huang","year":"2005","unstructured":"Huang, Z.J., Chen, K.F., Wang, Y.M.: Efficient identity-based signatures and blind signatures. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 120\u2013133. Springer, Heidelberg (2005)"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"28_CR4","first-page":"199","volume-title":"Advances in Cryptology-Crypto 1982","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signature for untraceable payment. In: Advances in Cryptology-Crypto 1982, pp. 199\u2013203. Springer, Heidelberg (1983)"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/11506157_27","volume-title":"Information Security and Privacy","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M., Hui, L.C.K., Yiu, S.M., Chow, K.P.: Two improved partially blind signature schemes from bilinear pairings. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 316\u2013328. Springer, Heidelberg (2005)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/3-540-45861-1_24","volume-title":"Information Security and Cryptology - ICISC 2001","author":"J.-H. Kim","year":"2002","unstructured":"Kim, J.-H., Kim, K., Lee, C.S.: An efficient and provably secure threshold blind signature. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 318\u2013327. Springer, Heidelberg (2002)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 221\u2013242. Springer, Heidelberg (1991)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"PKC 2003","author":"A. Boldyreva","year":"2003","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman group signature. In: PKC 2003. LNCS, vol.\u00a02139, pp. 31\u201346. Springer, Heidelberg (2003)"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/11602897_5","volume-title":"Information and Communications Security","author":"S. Wang","year":"2005","unstructured":"Wang, S., Bao, F., Deng, R.H.: Cryptanalysis of a forward secure blind signature scheme with provable security. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 53\u201360. Springer, Heidelberg (2005)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-30598-9_10","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., Koprowski, M., Warinschi, B.: Efficient Blind Signatures Without Random Oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 134\u2013146. Springer, Heidelberg (2005)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48658-5_23","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C. Dwork","year":"1994","unstructured":"Dwork, C., Naor, M.: An efficient existentially unforgeable signature scheme and its applications. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 234\u2013246. Springer, Heidelberg (1994)"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/off-line digital signatures. Journal of Cryptology (9), 35\u201367 (1996)","DOI":"10.1007\/BF02254791"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/501983.501988","volume-title":"The 8th ACM Conference on Computer and Communication security","author":"A. Perrig","year":"2001","unstructured":"Perrig, A.: The BiBa one-time signature and broadcast authentication. In: The 8th ACM Conference on Computer and Communication security, pp. 28\u201337. ACM, New York (2001)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Inomata, A., Okamoto, E.: A proposal of short proxy signature using pairing. In: The proceedings of the International Conference on Information Technology: Coding and Computing, pp. 631\u2013635 (2005)","DOI":"10.1109\/ITCC.2005.27"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Pointcheval, D.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology\u00a013(3), 361\u2013396","DOI":"10.1007\/s001450010003"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-36178-2_33","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"F. Zhang","year":"2002","unstructured":"Zhang, F., Kim, K.: ID-based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 533\u2013547. Springer, Heidelberg (2002)"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based Blind Signature and Proxy signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 312\u2013323. Springer, Heidelberg (2003)"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45600-7_1","volume-title":"Information and Communications Security","author":"C. Schnorr","year":"2001","unstructured":"Schnorr, C.: Security of blind discrete log signatures against interactive attacks. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 1\u201312. Springer, Heidelberg (2001)"},{"issue":"2","key":"28_CR19","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"X. Yi","year":"2003","unstructured":"Yi, X.: An Identity-Based Signature Scheme From the Weil Pairing. IEEE Communications Letter\u00a07(2), 76\u201378 (2003)","journal-title":"IEEE Communications Letter"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751632_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:00:45Z","timestamp":1619506845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751632_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340775","9783540340782"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11751632_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}