{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:30Z","timestamp":1726037550032},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_54","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"609-617","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme"],"prefix":"10.1007","author":[{"given":"Yamin","family":"Li","sequence":"first","affiliation":[]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"06","key":"54_CR1","first-page":"775","volume":"26","author":"W Gao","year":"2009","unstructured":"Gao, W., Zhang, G., Wang, X.: An improved elliptic curve digital signature algorithm. J. Nat. Sci. Heilongjiang Univ. 26(06), 775\u2013780 (2009)","journal-title":"J. Nat. Sci. Heilongjiang Univ."},{"issue":"1","key":"54_CR2","first-page":"19","volume":"56","author":"F Wu","year":"2018","unstructured":"Wu, F., Zhang, X., Yao, W., et al.: An advanced quantum-resistant signature scheme for cloud based on eisenstein ring. CMC: Comput. Mater. Contin. 56(1), 19\u201334 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"05","key":"54_CR3","first-page":"493","volume":"7","author":"ZG Ren","year":"2009","unstructured":"Ren, Z.G., Zhai, D.: Selection of security elliptic curve in finite field GF(q). Inf. Electron. Eng. 7(05), 493\u2013496 (2009)","journal-title":"Inf. Electron. Eng."},{"issue":"2","key":"54_CR4","doi-asserted-by":"crossref","first-page":"341","DOI":"10.32604\/cmc.2018.04006","volume":"57","author":"V Gopinath","year":"2018","unstructured":"Gopinath, V., Bhuvaneswaran, R.S.: Design of ECC based secured cloud storage mechanism for transaction rich applications. CMC: Comput. Mater. Contin. 57(2), 341\u2013352 (2018)","journal-title":"CMC: Comput. Mater. Contin."},{"issue":"17","key":"54_CR5","first-page":"4425","volume":"29","author":"Q Zhang","year":"2008","unstructured":"Zhang, Q., Guo, B., Xu, S., et al.: Fast elliptic curve signature verification algorithm. Comput. Eng. Des. 29(17), 4425\u20134427 (2008)","journal-title":"Comput. Eng. Des."},{"key":"54_CR6","unstructured":"Pan, X.: A new digital signature scheme based on elliptic curve. Appl. Comput. Syst. 17(1), 35\u201337 (2008)"},{"issue":"23","key":"54_CR7","first-page":"147","volume":"34","author":"Q Yang","year":"2008","unstructured":"Yang, Q., Xin, X., Ji, W.: Digital signature and proxy digital signature based on elliptic curve. Comput. Eng. 34(23), 147\u2013149 (2008)","journal-title":"Comput. Eng."},{"issue":"04","key":"54_CR8","first-page":"108","volume":"42","author":"M Wu","year":"2009","unstructured":"Wu, M., Liu, R., Zhang, F.: An improved algorithm for elliptic curve digital signature based on wireless LAN. Commun. Technol. 42(04), 108\u2013110 (2009)","journal-title":"Commun. Technol."},{"issue":"1","key":"54_CR9","first-page":"89","volume":"34","author":"L Chen","year":"2011","unstructured":"Chen, L., You, L.: Optimization and design of elliptic curve digital signature algorithm. Electron. Dev. 34(1), 89\u201393 (2011)","journal-title":"Electron. Dev."},{"issue":"4","key":"54_CR10","first-page":"23","volume":"27","author":"L Yan","year":"2014","unstructured":"Yan, L., Lu, C.: An elliptic curve digital signature scheme based on fast scalar multiplication algorithm. Electron. Sci. Technol. 27(4), 23\u201326 (2014)","journal-title":"Electron. Sci. Technol."},{"key":"54_CR11","unstructured":"Huiyan, C., Yong, Y., Zongjie, W., et al.: A forward secure digital signature based on elliptic curve. Telecommun. Sci. 31(10), 99\u2013102 (2015)"},{"issue":"4","key":"54_CR12","first-page":"38","volume":"52","author":"K Zhou","year":"2016","unstructured":"Zhou, K.: Analysis and improvement of an elliptic curve message recovery digital signature scheme. J. Northwest Normal Univ. (Nat. Sci. Ed.) 52(4), 38\u201340 (2016)","journal-title":"J. Northwest Normal Univ. (Nat. Sci. Ed.)"},{"issue":"S2","key":"54_CR13","first-page":"52","volume":"37","author":"J Han","year":"2017","unstructured":"Han, J., Cui, Z.: Data consistency verification method for election system. J. Comput. Appl. 37(S2), 52\u201356 (2017)","journal-title":"J. Comput. Appl."},{"issue":"6","key":"54_CR14","first-page":"608","volume":"35","author":"J Li","year":"2017","unstructured":"Li, J., Miao, X.: Analysis and improvement of forward-secure digital signature scheme. J. Jilin Univ. (Inf. Sci. Ed.) 35(6), 608\u2013611 (2017)","journal-title":"J. Jilin Univ. (Inf. Sci. Ed.)"},{"issue":"23","key":"54_CR15","first-page":"88","volume":"53","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Gao, D., Li, Y.: Hidden identity ring signature scheme using ECC. Comput. Eng. Appl. 53(23), 88\u201390 (2017)","journal-title":"Comput. Eng. Appl."},{"key":"54_CR16","unstructured":"Li, Y.: Simple analysis of ID-based multi-party simultaneous signature scheme on ECC. Kexue yu Xinxihua (2), 35\u201336 (2018)"},{"key":"54_CR17","unstructured":"Qin, X., Xin, Y., Lu, G.: Design and implementation of digital signature system based on elliptic curve. Comput. Eng. Appl. 39(28), 151\u2013155 (2003)"},{"key":"54_CR18","unstructured":"Li, X., Zhao, H., Wang, J., et al.: Improvement of ElGamal digital signature algorithm based on adding a random number. J. Northeast. Univ. (Nat. Sci. Ed.) 31(08), 1102\u20131104, 1112 (2010)"},{"key":"54_CR19","first-page":"95","volume-title":"Digital Signature Principle and Technology","author":"X Zhang","year":"2004","unstructured":"Zhang, X.: Digital Signature Principle and Technology, p. 95. Mechanical Industry Press, Beijing (2004)"},{"issue":"10 Supplement","key":"54_CR20","first-page":"377","volume":"30","author":"Y Han","year":"2003","unstructured":"Han, Y., Yang, X., Hu, J., et al.: Improved ECDSA signature algorithm. Comput. Sci. 30(10 Supplement), 377\u2013378 (2003)","journal-title":"Improved ECDSA signature algorithm. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:27:04Z","timestamp":1695032824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}