{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:07:21Z","timestamp":1743084441585,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540668879"},{"type":"electronic","value":"9783540466659"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-46665-7_30","type":"book-chapter","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T01:23:44Z","timestamp":1190683424000},"page":"258-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Delegated Decryption"],"prefix":"10.1007","author":[{"given":"Yi","family":"Mu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khan","family":"Quac Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[1999,11,19]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"D. Chaum and E. van Heijst, \u201cGroup signatures,\u201d inAdvances in Cryptology-EUROCRYPT\u201991, (New York), pp. 257\u2013265, Springer-Verlag, 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"30_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-57843-9","volume-title":"Adances in cryptology-EUROCRYPT\u201994","author":"L. Chen","year":"1994","unstructured":"L. Chen and T.P. Pedersen, \u201cNew group signature schemes,\u201d inAdances in cryptology-EUROCRYPT\u201994, Lecture Notes in Computer Science 950, pp. 171\u2013181, Springer-Verlag, Berlin, 1994."},{"key":"30_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-69053-0_32","volume-title":"Adances in cryptology-EUROCRYPT\u201997","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch, \u201cEfficient and generalized group signatures,\u201d inAdances in cryptology-EUROCRYPT\u201997, Lecture Notes in Computer Science 1233, pp. 465\u2013479, Springer-Verlag, Berlin, 1997."},{"key":"30_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch and M. Stadler, \u201cEfficient group signature schemes for large groups,\u201d in Advances in Cryptology, Proc. CRYPTO 97, LNCS 1296, pp. 410\u2013424, Springer-Verlag, Berlin, 1997."},{"key":"30_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology, Proc. CRYPTO 84","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public-key cryptosystem and a signature scheme based on discrete logarithms,\u201d inAdvances in Cryptology, Proc. CRYPTO 84, LNCS 196, pp. 10\u201318, Springer-Verlag, Berlin, 1985."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Y. Zheng, \u201cDigital signcryption or how to achieve cost(signature & encryption) cost(signature) + cost(encryption), \u201d inAdvances in Cryptology-CRYPTO\u2019 97 Proceedings, Springer Verlag, 1997.","DOI":"10.1007\/BFb0052234"},{"key":"30_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0053434","volume-title":"Advances in Cryptology, Proc. EUROCRYPT 94","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg and R.A. Rueppel, \u201cMessage recovery for signature schemes based on the discrete logarithm problem,\u201d inAdvances in Cryptology, Proc. EUROCRYPT 94, LNCS 950, (Berlin), pp. 182\u2013193, Springer-Verlag, 1994."},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"M. Mambo, K. Usuda, and E. Okamoto, \u201cProxy signatures for delegating signing operation,\u201d inProc. of the Third ACM Conf. on Computer and Communications Security, pp. 48\u201357, 1996.","DOI":"10.1145\/238168.238185"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46665-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T19:29:20Z","timestamp":1585855760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46665-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540668879","9783540466659"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46665-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"19 November 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}