{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:16:53Z","timestamp":1759637813345,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540008477"},{"type":"electronic","value":"9783540365631"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36563-x_7","type":"book-chapter","created":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T14:24:59Z","timestamp":1194013499000},"page":"98-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["A Secure Signature Scheme from Bilinear Maps"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Ilya","family":"Mironov","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Shoup","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,28]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"N. Bari\u0107 and B. Pfitzmann, \u201cCollision-free accumulators and fail-stop signature schemes without trees,\u201d Proc. of Eurocrypt\u201997, pp. 480\u2013494, 1997. 100","DOI":"10.1007\/3-540-69053-0_33"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"D. Boneh and M. Franklin, \u201cIdentity based encryption from the Weil pairing,\u201d Proc. of CRYPTO\u201901, pp. 213\u2013229, 2001. Also http:\/\/eprint.iacr.org\/2001\/090\/ . 99, 100, 108","DOI":"10.1007\/3-540-44647-8_13"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"D. Boneh, B. Lynn, and H. Shacham, \u201cShort signatures from the Weil pairing,\u201d Proc. of Asiacrypt\u201901, pp. 514\u2013532, 2001. 99","DOI":"10.1007\/3-540-45682-1_30"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal asymmetric encryption\u2014how to encrypt with RSA,\u201d Proc. of Eurocrypt\u201994, pp. 92\u2013111, 1994. 101","DOI":"10.1007\/BFb0053428"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"R. Cramer and I. Damg\u00e5rd, \u201cSecure signature schemes based on interactive protocols,\u201d Proc. of CRYPTO\u201995, pp. 297\u2013310, 1995. 99, 102","DOI":"10.1007\/3-540-44750-4_24"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"R. Cramer and I. Damg\u00e5rd, \u201cNew generation of secure and practical RSAbased signatures,\u201d Proc. of CRYPTO\u201996, pp. 173\u2013185, 1996. 98, 102, 103","DOI":"10.1007\/3-540-68697-5_14"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup, \u201cSignature schemes based on the Strong RSA assumption,\u201d Proc. of ACM CCS\u201999, pp. 46\u201351, 1999. Full version appeared in ACM TISSEC, v. 3(3), pp. 161\u2013185, 2000. 98, 102, 103","DOI":"10.1145\/357830.357847"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"C. Dwork and M. Naor, \u201cAn efficient existentially unforgeable signature scheme and its applications,\u201d Proc. of CRYPTO\u201994, pp. 234\u2013246, 1994. Full version appeared in J. of Cryptology, v. 11(2), pp. 187\u2013208, 1998. 98, 102, 103","DOI":"10.1007\/s001459900043"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir, \u201cZero-knowledge proofs of identity,\u201d J. of Cryptology, v. 1, pp. 77\u201394, 1988.","journal-title":"J. of Cryptology"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"R. Gennaro, S. Halevi, and T. Rabin, \u201cSecure hash-and-sign signatures without the random oracle,\u201d Proc. of Eurocrypt\u201999, pp. 123\u2013139, 1999. 98, 102, 103","DOI":"10.1007\/3-540-48910-X_9"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"C. Gentry and A. Silverberg, \u201cHierarchical ID-based cryptography\u201d, Proc. of Asiacrypt\u201902, pp. 548\u2013566, 2002. 99","DOI":"10.1007\/3-540-36178-2_34"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich, \u201cTwo remarks concerning the Goldwasser-Micali-Rivest signature scheme,\u201d Proc. of CRYPTO\u201986, pp. 104\u2013110, 1986. 103, 104","DOI":"10.1007\/3-540-47721-7_8"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and R. Rivest, \u201cA \u2018paradoxical\u2019 solution to the signature problem (extended abstract),\u201d Proc. of FOCS\u201984, pp. 441\u2013448, 1984. Journal version in [GMR88]. 101, 102","DOI":"10.1109\/SFCS.1984.715946"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest, \u201cA digital signature scheme secure against adaptive chosen-message attacks,\u201d SIAM J. on Computing, 17(2), pp. 281\u2013308, 1988. 101, 110","journal-title":"SIAM J. on Computing"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"J. Horwitz and B. Lynn, \u201cTowards hierarchical identity-based encryption\u201d, Proc. of Eurocrypt\u201902, pp. 466\u2013481, 2002. 99","DOI":"10.1007\/3-540-46035-7_31"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"A. Joux, \u201cA one-round protocol for tripartite Diffie-Hellman,\u201d Proc. of ANTS\u201900, pp. 385\u2013394, 2000. 99","DOI":"10.1007\/10722028_23"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"A. Lysyanskaya, \u201cUnique signatures and verifiable random functions from DH-DDH separation,\u201d Proc. of CRYPTO\u201902, pp. 597\u2013612, 2002. 99, 102","DOI":"10.1007\/3-540-45708-9_38"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"S. Micali, M. Rabin, and S. Vadhan, \u201cVerifiable random functions,\u201d Proc. of FOCS\u201999, pp. 120\u2013130, 1999. 99","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"7_CR19","unstructured":"A. Miyaji, M. Nakabayashi, and S. Takano, \u201cNew explicit condition of elliptic curve trace for FR-reduction,\u201d IEICE Trans. Fundamentals, v. E84 A(5), May 2001. 109"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, \u201cUniversal one-way hash functions and their cryptographic applications,\u201d Proc. of STOC\u201989, pp. 33\u201343, 1989. 98, 102","DOI":"10.1145\/73007.73011"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity proofs for signature schemes,\u201d in Proc. of Eurocrypt\u201996, pp. 387\u2013398, 1996. 99","DOI":"10.1007\/3-540-68339-9_33"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"J. Rompel, \u201cOne-way functions are necessary and sufficient for secure signatures,\u201d Proc. of STOC\u201990, pp. 387\u2013394, 1990. 98, 102","DOI":"10.1145\/100216.100269"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"E. Verheul, \u201cSelf-Blindable Credential Certificates from the Weil Pairing,\u201d Proc. of Asiacrypt\u201901, pp. 533\u2013551, 2001. 99","DOI":"10.1007\/3-540-45682-1_31"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2014 CT-RSA 2003"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36563-X_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T02:05:22Z","timestamp":1737511522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36563-X_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540008477","9783540365631"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36563-x_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"28 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}