{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:21Z","timestamp":1725485901395},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_4","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"48-61","source":"Crossref","is-referenced-by-count":8,"title":["Convertible Group Undeniable Signatures"],"prefix":"10.1007","author":[{"given":"Yuh-Dauh","family":"Lyuu","sequence":"first","affiliation":[]},{"given":"Ming-Luen","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. 1st ACM Conference on Computer and Communications Security, pages 62\u201373, 1993. 49","DOI":"10.1145\/168588.168596"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"J. Boyar, D. Chaum, I. Damg\u00e5rd, and T. Pedersen. Convertible undeniable signatures. In Advances in Cryptology-CRYPTO\u2019 90, pages 189\u2013205, 1990. 48, 49","DOI":"10.1007\/3-540-38424-3_14"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In Advances in Cryptology-CRYPTO\u2019 97, pages 410\u2013424, 1997. 49","DOI":"10.1007\/BFb0052252"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"D. Chaum. Zero-knowledge undeniable signatures (extended abstract). In Advances in Cryptology-EUROCRYPT 90, pages 458\u2013464, 1990. 49, 56, 57","DOI":"10.1007\/3-540-46877-3_41"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"D. Chaum and H. van Antwerpen. Undeniable signatures. In Advances in Cryptology-CRYPTO\u2019 89, pages 212\u2013216, 1989. 48","DOI":"10.1007\/0-387-34805-0_20"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 91, pages 257\u2013265, 1991. 49","DOI":"10.1007\/3-540-46416-6_22"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd and T. Pedersen. New convertible undeniable signature schemes. In Advances in Cryptology-EUROCRYPT 96, pages 372\u2013386, 1996. 49","DOI":"10.1007\/3-540-68339-9_32"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"S. J. Kim, S. J. Park and D. H. Won. Convertible group signatures. In Advances in Cryptology-ASIACRYPT 96, pages 311\u2013321, 1996.","DOI":"10.1007\/BFb0034857"},{"key":"4_CR9","unstructured":"M. Michels and M. Stadler. Efficient convertible undeniable signature schemes. In Proc. 4th Workshop on Selected Areas in Cryptography (SAC\u2019 97), pages 231\u2013244, 1997. 49"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361\u2013396, 2000. 54","journal-title":"Journal of Cryptology"},{"key":"4_CR11","unstructured":"K.H. Rosen. Elementary Number Theory and its Applications (Third Edition). Addison Wesley, 1993. 51"},{"key":"4_CR12","unstructured":"H. N. Shapiro. Introduction to the Theory of Numbers. John Wiley & Sons, 1983. 51"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T15:37:32Z","timestamp":1556465852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}