{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:31:40Z","timestamp":1725543100500},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540369257"},{"type":"electronic","value":"9783540369264"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11809678_40","type":"book-chapter","created":{"date-parts":[[2006,8,15]],"date-time":"2006-08-15T13:41:33Z","timestamp":1155649293000},"page":"378-386","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Partially Blind Signature Scheme with Provable Security"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Gong","sequence":"first","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signature for untraceable payments. In: Advances in Cryptology-CRYPTO 1982, pp. 199\u2013203 (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/BFb0034851","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Abe","year":"1996","unstructured":"Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 244\u2013251. Springer, Heidelberg (1996)"},{"key":"40_CR3","unstructured":"Chien, H.Y., Jan, J.K., Tseng, Y.M.: RSA-based partially blind signature with low computation. In: Proceedings of the eighth international conference on parallel and distributed systems, pp. 385\u2013389 (2001)"},{"issue":"1","key":"40_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.cose.2004.05.008","volume":"24","author":"T.J. Cao","year":"2005","unstructured":"Cao, T.J., et al.: A randomized RSA-based partially blind signature scheme for electronic cash. Computers & Security\u00a024(1), 44\u201349 (2005)","journal-title":"Computers & Security"},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0020-0190(84)90088-7","volume":"19","author":"A. Shamir","year":"1984","unstructured":"Shamir, A., Schnorr, C.P.: Cryptanalysis of certain variants of Rabin\u2019s signature scheme. Information proceeding Letters\u00a019, 113\u2013115 (1984)","journal-title":"Information proceeding Letters"},{"issue":"3","key":"40_CR6","first-page":"730","volume":"E86-A","author":"M.S. Kwon","year":"2003","unstructured":"Kwon, M.S., Cho, Y.K.: Randomization enhanced blind signature schemes based on RSA. IEICE A Fundam 2003\u00a0E86-A(3), 730\u2013733 (2003)","journal-title":"IEICE A Fundam 2003"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-44598-6_17","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"M. Abe","year":"2000","unstructured":"Abe, M., Okamoto, T.: Provably secure partially blind signatures. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 271\u2013286. Springer, Heidelberg (2000)"},{"key":"40_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-45664-3_7","volume-title":"Public Key Cryptography","author":"G. Maitland","year":"2002","unstructured":"Maitland, G., Boyd, C.: A provably secure restrictive partially blind signature scheme. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 99\u2013114. Springer, Heidelberg (2002)"},{"issue":"3","key":"40_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/S0164-1212(03)00237-1","volume":"73","author":"H.F. Huang","year":"2003","unstructured":"Huang, H.F., Chang, C.C.: A new design of efficient partially blind signature scheme. Journal of Systems and Software\u00a073(3), 397\u2013403 (2003)","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"40_CR10","first-page":"818","volume":"E81-A","author":"C.I. Fan","year":"1998","unstructured":"Fan, C.I., Lei, C.L.: Low-computation partially blind signatures for electronic cash. IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E81-A(5), 818\u2013824 (1998)","journal-title":"IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"2-3","key":"40_CR11","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/S0096-3003(03)00277-7","volume":"145","author":"C.I. Fan","year":"2003","unstructured":"Fan, C.I.: Improved low-computation partially blind signatures. Applied Mathematics and Computation\u00a0145(2-3), 853\u2013867 (2003)","journal-title":"Applied Mathematics and Computation"},{"key":"40_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-24582-7_14","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., et al.: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 191\u2013204. Springer, Heidelberg (2003)"},{"key":"40_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/11506157_27","volume-title":"Information Security and Privacy","author":"S.M. Sherman","year":"2005","unstructured":"Sherman, S.M., et al.: Two Improved Partially Blind Signature Schemes from Bilinear Pairings. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 316\u2013328. Springer, Heidelberg (2005)"},{"key":"40_CR14","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trends in Network and Pervasive Computing - ARCS 2002","author":"C.P. Schnorr","year":"2002","unstructured":"Schnorr, C.P.: Discrete log signatures against interactive attacks. In: Schmeck, H., Ungerer, T., Wolf, L. (eds.) ARCS 2002. LNCS, vol.\u00a02299, pp. 1\u201312. Springer, Heidelberg (2002)"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"40_CR16","first-page":"77","volume":"1","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptography\u00a01, 77\u201394 (1988)","journal-title":"Journal of Cryptography"},{"key":"40_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/BFb0055741","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"K. Ohta","year":"1998","unstructured":"Ohta, K., Okamoto, T.: On concrete security treatment of signatures derived from identification. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 354\u2013370. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11809678_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:26:39Z","timestamp":1619508399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11809678_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540369257","9783540369264"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11809678_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}