{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:21Z","timestamp":1776681321258,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440796","type":"print"},{"value":"9783540460886","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46088-8_15","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:08:39Z","timestamp":1179745719000},"page":"156-165","source":"Crossref","is-referenced-by-count":43,"title":["Provably Secure Implicit Certificate Schemes"],"prefix":"10.1007","author":[{"given":"Daniel R. L.","family":"Brown","sequence":"first","affiliation":[]},{"given":"Robert","family":"Gallant","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Vanstone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,31]]},"reference":[{"key":"15_CR1","unstructured":"B. Arazi, \u201cAn identity-based DL\/EC key agreement technique\u201d, Presentation to IEEE P1363a, available from http:\/\/grouper.ieee.org\/groups\/1363\/addendum.html"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, \u201c Practice-oriented provable-security\u201d, Proceedings of First International Workshop on Information Security (ISW\u201997), 1998.","DOI":"10.1007\/BFb0030423"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cRandom oracles are practical: a paradigm for designing efficient protocols\u201d, 1st ACM Conference on Computer and Communications Security, 1993 pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"D. Brown and D. Johnson, \u201cFormal security proofs for a signature scheme with partial message recovery\u201d, preprint, 2000.","DOI":"10.1007\/3-540-45353-9_11"},{"key":"15_CR5","unstructured":"D. Brown, \u201cImplicitly Certifying Signatures Securely\u201d, preprint, 2000."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"R. Canetti, O. Goldreich, and S. Halevi, \u201cThe Random Oracle Methodology, Revisited (Preliminary Version)\u201d, Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998, pp. 209\u2013218.","DOI":"10.1145\/276698.276741"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"M. Girault, \u201cSelf-certified public keys\u201d, Advances in Cryptology \u2014 Eurocrypt\u201991, 1991, pp. 490\u2013497.","DOI":"10.1007\/3-540-46416-6_42"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"C.G. G\u00fcnther, \u201cAn identity-based key-exchange protocol\u201d, Advances in Cryptology \u2014 Eurocrypt\u201989, 1989, pp. 29\u201337.","DOI":"10.1007\/3-540-46885-4_5"},{"key":"15_CR9","unstructured":"IEEE P1363a, \u201cStandard Specifications for Public-Key Cryptography: Additional Techniques\u201d, Working Draft, August 16, 2000."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. vanOorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"15_CR11","first-page":"61","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"K. Nyberg and R. Rueppel, \u201cMessage recovery for signature schemes based on the discrete logarithm problem\u201d, Designs, Codes and Cryptography, 7 (1996), pp. 61\u201381.","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"L. Pintsov and S. Vanstone, \u201cPostal Revenue Collection in the Digital Age\u201d, Proceedings of Financial Cryptography 2000, to appear.","DOI":"10.1007\/3-540-45472-1_8"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity proofs for signature schemes\u201d, Advances in Cryptology \u2014 Eurocrypt\u201996, 1996, pp. 387\u2013398.","DOI":"10.1007\/3-540-68339-9_33"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"D. Pointcheval, J. Stern, \u201cSecurity arguments proofs for Digital Signatures and Blind Signatures\u201d, Journal of Cryptology, 2000, pp. 361\u2013396.","DOI":"10.1007\/s001450010003"},{"key":"15_CR15","unstructured":"M. Qu and S. Vanstone, \u201cImplicit Certificate Schemes\u201d, preprint, 1997."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. Schnorr","year":"1991","unstructured":"C. Schnorr, \u201cEfficient signature generation by smart cards\u201d, Journal of Cryptology, 4 (1991), pp. 161\u2013174.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46088-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:24:36Z","timestamp":1556432676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46088-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440796","9783540460886"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46088-8_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}