{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:20:23Z","timestamp":1736659223229,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_104","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"1002-1010","source":"Crossref","is-referenced-by-count":1,"title":["A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Yumin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"104_CR1","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign message. IEICE Transaction of Fundamentals\u00a0E79-A (9), 1338\u20131354 (1996)","journal-title":"IEICE Transaction of Fundamentals"},{"key":"104_CR2","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegation signing operation. In: Proceedings of 3rd ACM Conference on Computer and Communication Security, pp. 48\u201357 (1996)","DOI":"10.1145\/238168.238185"},{"issue":"5","key":"104_CR3","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1049\/ip-cdt:19990647","volume":"146","author":"H.M. Sun","year":"1999","unstructured":"Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signature scheme. IEE Proc., Comput. Digit. Tech\u00a0146(5), 259\u2013263 (1999)","journal-title":"IEE Proc., Comput. Digit. Tech"},{"key":"104_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/BFb0030429","volume-title":"Information Security","author":"K. Zhang","year":"1998","unstructured":"Zhang, K.: Threshold Proxy Signature Schemes. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 282\u2013290. Springer, Heidelberg (1998)"},{"issue":"2-3","key":"104_CR5","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/S0096-3003(02)00043-7","volume":"136","author":"C.L. Hsu","year":"2003","unstructured":"Hsu, C.L., Wu, T.S., Wu, T.C.: Improvement of threshold proxy signature scheme. Applied Mathematics and Computation\u00a0136(2-3), 315\u2013321 (2003)","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"104_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.csi.2004.03.005","volume":"27","author":"Z. Shao","year":"2004","unstructured":"Shao, Z.: Improvement of threshold proxy signature scheme. Computer Standards & Interfaces\u00a027(1), 53\u201359 (2004)","journal-title":"Computer Standards & Interfaces"},{"key":"104_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0164-1212(02)00090-0","volume":"67","author":"T.S. Wu","year":"2003","unstructured":"Wu, T.S., Hsu, C.L.: Threshold signature scheme using self-certified public keys. The Journal of Systems and Software\u00a067, 89\u201397 (2003)","journal-title":"The Journal of Systems and Software"},{"key":"104_CR8","unstructured":"Wang, M., Liu, Z.J.: An identity-based proxy ring signature scheme from bilinear pairings. In: Computer and Information Technology (CIT 2005), pp. 695\u2013699 (2005)"},{"key":"104_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, X.G., Liu, J.M., Wang, X.M.: An Identity-Based Signature and Its Threshold Version. In: Advanced Information Networking and Applications (AINA 2005), vol.\u00a01, pp. 973\u2013977 (2005)","DOI":"10.1109\/AINA.2005.104"},{"key":"104_CR10","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.amc.2004.06.089","volume":"167","author":"Y.L. Yu","year":"2005","unstructured":"Yu, Y.L., Chen, T.S.: An efficient threshold group signature scheme. Applied Mathematics and Computation\u00a0167, 362\u2013371 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"104_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"issue":"3","key":"104_CR12","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol.\u00a013(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_104.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T17:54:05Z","timestamp":1736618045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11902140_104","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}