{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T14:59:35Z","timestamp":1777042775792,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_20","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"310-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":357,"title":["Efficient Identity Based Signature Schemes Based on Pairings"],"prefix":"10.1007","author":[{"given":"Florian","family":"Hess","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"20_CR1","unstructured":"S. Blackburn, S. Blake-Wilson, M. Burmester and S. D. Galbraith. Shared Generation of Shared RSA Keys. University of Waterloo technical report, CORR 98-19 (1998)."},{"key":"20_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"Advances in Cryptology-CRYPTO\u2019 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In Advances in Cryptology-CRYPTO\u2019 97, Springer-Verlag LNCS 1294, 425\u2013439, 1997."},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, Springer-Verlag LNCS 2139, 213\u2013229, 2001."},{"key":"20_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology-ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, B. Lynn and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, Springer-Verlag LNCS 2248, 514\u2013532, 2001."},{"key":"20_CR5","unstructured":"J. Cha and J. Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups IACR preprint server, submission 2002\/018, 2002."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BFb0024452","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"1997","unstructured":"C. Cocks. Split knowledge generation of RSA parameters. In Cryptography and Coding, Springer-Verlag LNCS 1355, 89\u201395, 1997."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, Springer-Verlag LNCS 2260, 360\u2013363. 2001."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology-ASIACRYPT 2001","author":"S. D. Galbraith","year":"2001","unstructured":"S. D. Galbraith. Supersingular curves in cryptography. In Advances in Cryptology-ASIACRYPT 2001, Springer-Verlag LNCS 2248, 495\u2013513, 2001."},{"key":"20_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory Symposium, ANTS-IV","author":"A. Joux","year":"2000","unstructured":"A. Joux. A one round protocol for tripartite Diffie-Hellman. In Algorithmic Number Theory Symposium, ANTS-IV, Springer-Verlag LNCS 1838, 385\u2013394, 2000."},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. J. Menezes","year":"1993","unstructured":"A. J. Menezes, T. Okamoto and S. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Info. Th., 39, 1639\u20131646, 1993.","journal-title":"IEEE Trans. Info. Th."},{"key":"20_CR11","unstructured":"A. J. Menezes, P. C. Oorschot and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"20_CR12","unstructured":"V. Miller. Short programs for functions on curves. Unpublished manuscript, 1986."},{"issue":"1\/2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1023\/A:1018096612468","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"K. Nyberg and R. A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, 7(1\/2), 61\u201381, 1996.","journal-title":"Designs, Codes and Cryptography"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"K. G. Paterson. ID-based signatures from pairings on elliptic curves IACR preprint server, submission 2002\/003, 2002.","DOI":"10.1049\/el:20020682"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361\u2013396, 2000.","journal-title":"Journal of Cryptology"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"K. Rubin and A. Silverberg. The best and worst of supersingular abelian varieties in cryptology. IACR preprint server, submission 2002\/006, 2002.","DOI":"10.1007\/3-540-45708-9_22"},{"key":"20_CR17","unstructured":"R. Sakai, K. Ohgishi and M. Kasahara. Cryptosystems based on pairing. In SCIS 2000, 2000."},{"key":"20_CR18","series-title":"Lect Notes Comput Sci","first-page":"47","volume-title":"Advances in Cryptology-CRYPTO\u2019 84","author":"A. Shamir","year":"1984","unstructured":"A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-CRYPTO\u2019 84, Springer-Verlag LNCS 196, 47\u201353, 1984."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"J. H. Silverman. The Arithmetic of Elliptic Curves. GTM 106, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T03:04:05Z","timestamp":1579143845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}