{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:57:12Z","timestamp":1725487032861},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_17","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T15:21:45Z","timestamp":1183389705000},"page":"199-214","source":"Crossref","is-referenced-by-count":10,"title":["Self-certified Signatures"],"prefix":"10.1007","author":[{"given":"Byoungcheon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology: Eurocrypt\u201991","author":"M. Girault","year":"1991","unstructured":"M. Girault, \u201cSelf-certified public keys\u201d, Advances in Cryptology: Eurocrypt\u201991, LNCS 547, Springer-Verlag, 1991, pages 490\u2013497."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Proxy signatures, revisited","author":"S. Kim","year":"1997","unstructured":"S. Kim, S. Park, and D. Won, \u201cProxy signatures, revisited\u201d, In Proc. of ICICS\u201997, International Conference on Information and Communications Security, Springer, Lecture Notes in Computer Science, LNCS 1334, pages 223\u2013232, 1997."},{"issue":"9","key":"17_CR3","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"M. Mambo, K. Usuda, and E. Okamoto, \u201cProxy signatures: Delegation of the power to sign messages\u201d, In IEICE Trans. Fundamentals, Vol. E79-A, No. 9, Sep., pages 1338\u20131353, 1996.","journal-title":"IEICE Trans. Fundamentals"},{"key":"17_CR4","unstructured":"B. Lee and K. Kim, \u201cSelf-Certificate: PKI using Self-Certified Key\u201d, Proc. of Conference on Information Security and Cryptology 2000, Vol. 10, No. 1, pages 65\u201373, 2000."},{"key":"17_CR5","unstructured":"B. Lee, H. Kim and K. Kim, \u201cStrong Proxy Signature and its Applications\u201d, Proc. of SCIS2001, pages 603\u2013608, 2001."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/3-540-47719-5_37","volume-title":"Secure Mobile Agent using Strong Non-designated Proxy Signature","author":"B. Lee","year":"2001","unstructured":"B. Lee, H. Kim and K. Kim, \u201cSecure Mobile Agent using Strong Non-designated Proxy Signature\u201d, Proc. of ACISP2001, LNCS Vol.2119, Springer-Verlag, pages 474\u2013486, 2001."},{"key":"17_CR7","unstructured":"S. Tuecke, et. al., \u201cInternet X.509 Public Key Infrastructure Proxy Certificate Pro.le\u201d, IETF, 2002."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"H. Petersen and P. Horster, \u201cSelf-certified keys-Concepts and Applications\u201d, In Proc. Communications and Multimedia Security\u201997, pages 102\u2013116, Chapman & Hall, 1997.","DOI":"10.1007\/978-0-387-35256-5_8"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity Proofs for Signatures\u201d, Advances in Cryptology: Eurocrypt\u201996, pages 387\u2013398, Springer, 1996.","DOI":"10.1007\/3-540-68339-9_33"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity arguments for digital signatures and blind signatures\u201d, Journal of Cryptology, Vol. 13, No. 3, pages 361\u2013396, Springer-Verlag, 2000.","journal-title":"Journal of Cryptology"},{"key":"17_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology: Crypto\u201984","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, \u201cIdentity-based cryptosystems and signature schemes\u201d, Advances in Cryptology: Crypto\u201984, LNCS 196, Springer-Verlag, pages 47\u201353, 1985."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T01:26:24Z","timestamp":1556587584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}