{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:05:52Z","timestamp":1742382352022},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540008477"},{"type":"electronic","value":"9783540365631"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36563-x_5","type":"book-chapter","created":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T10:24:59Z","timestamp":1193999099000},"page":"68-79","source":"Crossref","is-referenced-by-count":38,"title":["An Analysis of Proxy Signatures: Is a Secure Channel Necessary?"],"prefix":"10.1007","author":[{"given":"Jung-Yeun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,28]]},"reference":[{"key":"5_CR1","unstructured":"Javier Herranz and German Saez \u201cFully Distributed Proxy Signature Schemes\u201d, http:\/\/eprint.iacr.org\/ , 2002."},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Proxy signatures, revisited","author":"S. Kim","year":"1997","unstructured":"S. Kim, S. Park, and D. Won, \u201cProxy signatures, revisited\u201d, In Pro. of ICICS\u201997, International Conference in Information and Communications Security, Springer, Lecture Notes in Computer Science, LNCS1334, pages 223\u2013232, 1997. 68, 69, 72"},{"key":"5_CR3","unstructured":"Byoungcheon Lee, Heesun Kim, Kwangjo Kim, \u201cStrong Proxy Signature and its Applications\u201d, SCIS2001, vol 2\/2 pp 603\u2013608, Jan.23 26, 2001. 68, 69, 72, 75, 76"},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/3-540-47719-5_37","volume-title":"Secure Mobile Agent using Strong Non-designated Proxy Signature","author":"B. Lee","year":"2001","unstructured":"Byoungcheon Lee, Heesun Kim, and Kwangjo Kim \u201cSecure Mobile Agent using Strong Non-designated Proxy Signature\u201d, Proc. of ACISP2001, LNCS, Springer Verlag Vol.2119, pp.474\u2013486, 2001."},{"issue":"9","key":"5_CR5","first-page":"1338","volume":"E79\u2013A","author":"M. Mambo","year":"1996","unstructured":"M. Mambo, K. Usuda, and E. Okamoto, \u201croxy signature: Delegation of the power o sign messages\u201d, In IEICE Trans. Fundamentals, Vol. E79\u2013A, No. 9, Sep., pp. 1338\u20131353, 1996. 68, 69, 70, 76","journal-title":"IEICE Trans. Fundamentals"},{"key":"5_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/3-540-47790-X_21","volume-title":"Extended Proxy Signatures for Smart Cards","author":"T. Okamoto","year":"1999","unstructured":"Takeshi Okamoto, Mitsuru Tada, and Eiji Okamoto, \u201cExtended Proxy Signatures for Smart Cards\u201d, In Pro. of ISW\u201999 Springer, Lecture Notes in Computer Science, LNCS 1729, pp. 247\u2013258, 1999. 69, 76"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"H. Petersen and P. Horster, \u201cSelf-certified keys-Concepts and Applications\u201d, In Proc. Communications and Multimedia Security\u201997, pages 102\u2013116, Chapman and Hall, 1997. 69, 71","DOI":"10.1007\/978-0-387-35256-5_8"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity proofs for signatures\u201d, In Advances in Cryptoloy: Eurocrypt\u201996, pages 387\u2013398, Springer, 1996. 74, 78","DOI":"10.1007\/3-540-68339-9_33"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2014 CT-RSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36563-X_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T00:23:20Z","timestamp":1556929400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36563-X_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540008477","9783540365631"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-36563-x_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}