{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:19:42Z","timestamp":1766578782682,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031230974"},{"type":"electronic","value":"9783031230981"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23098-1_1","type":"book-chapter","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T14:04:12Z","timestamp":1672754652000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Asymmetric Secure Multi-party Signing Protocol for\u00a0the\u00a0Identity-Based Signature Scheme in\u00a0the\u00a0IEEE P1363 Standard for\u00a0Public Key Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-7856","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6927-7855","authenticated-orcid":false,"given":"Qi","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-3255","authenticated-orcid":false,"given":"Cong","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1819-9332","authenticated-orcid":false,"given":"Min","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abram, D., Nof, A., Orlandi, C., Scholl, P., Shlomovits, O.: Low-bandwidth threshold ECDSA via pseudorandom correlation generators. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 2554\u20132572. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833559"},{"key":"1_CR2","unstructured":"Alharbi, F., Alrawais, A., Rabiah, A.B., Richelson, S., Abu-Ghazaleh, N.: $$\\{$$CSProp$$\\}$$: ciphertext and signature propagation $$\\{$$Low-Overhead$$\\}$$$$\\{$$Public-Key$$\\}$$ cryptosystem for $$\\{$$IoT$$\\}$$ environments. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 609\u2013626 (2021)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 805\u2013817 (2016)","DOI":"10.1145\/2976749.2978331"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-030-26954-8_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"E Boyle","year":"2019","unstructured":"Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Scholl, P.: Efficient pseudorandom correlation generators: silent OT extension and more. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11694, pp. 489\u2013518. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26954-8_16"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Boyle, E., Gilboa, N., Ishai, Y., Nof, A.: Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 869\u2013886 (2019)","DOI":"10.1145\/3319535.3363227"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-030-45388-6_10","volume-title":"Public-Key Cryptography \u2013 PKC 2020","author":"G Castagnos","year":"2020","unstructured":"Castagnos, G., Catalano, D., Laguillaumie, F., Savasta, F., Tucker, I.: Bandwidth-efficient threshold EC-DSA. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC 2020. LNCS, vol. 12111, pp. 266\u2013296. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45388-6_10"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-16715-2_26","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"G Castagnos","year":"2015","unstructured":"Castagnos, G., Laguillaumie, F.: Linearly homomorphic encryption from $$\\sf DDH$$. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 487\u2013505. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16715-2_26"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chandran, N., Garay, J.A., Mohassel, P., Vusirikala, S.: Efficient, constant-round and actively secure MPC: beyond the three-party case. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 277\u2013294 (2017)","DOI":"10.1145\/3133956.3134100"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1007\/978-3-030-59013-0_32","volume-title":"Computer Security \u2013 ESORICS 2020","author":"A Dalskov","year":"2020","unstructured":"Dalskov, A., Orlandi, C., Keller, M., Shrishak, K., Shulman, H.: Securing DNSSEC keys via threshold ECDSA from generic MPC. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12309, pp. 654\u2013673. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_32"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 980\u2013997. IEEE (2018)","DOI":"10.1109\/SP.2018.00036"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Threshold ECDSA from ECDSA assumptions: the multiparty case. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1051\u20131066. IEEE (2019)","DOI":"10.1109\/SP.2019.00024"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1049\/iet-ifs.2019.0559","volume":"14","author":"Q Feng","year":"2020","unstructured":"Feng, Q., He, D., Liu, Z., Wang, D., Choo, K.K.R.: Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Inf. Secur. 14(4), 443\u2013451 (2020)","journal-title":"IET Inf. Secur."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Feng, Q., He, D., Luo, M., Li, Z., Choo, K.K.R.: Practical secure two-party EdDSA signature generation with key protection and applications in cryptocurrency. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 137\u2013147. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00031"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179\u20131194 (2018)","DOI":"10.1145\/3243734.3243859"},{"key":"1_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8","volume-title":"Efficient Secure Two-party Protocols: Techniques and Constructions","author":"C Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Efficient Secure Two-party Protocols: Techniques and Constructions. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14303-8"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1109\/TDSC.2018.2857775","volume":"17","author":"D He","year":"2018","unstructured":"He, D., Zhang, Y., Wang, D., Choo, K.K.R.: Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IEEE Trans. Dependable Secure Comput. 17(5), 1124\u20131132 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/978-3-319-63715-0_21","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"Y Lindell","year":"2017","unstructured":"Lindell, Y.: Fast secure two-party ECDSA signing. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 613\u2013644. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_21"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837\u20131854 (2018)","DOI":"10.1145\/3243734.3243788"},{"issue":"7","key":"1_CR19","first-page":"4022","volume":"34","author":"SG Liu","year":"2022","unstructured":"Liu, S.G., Liu, R., Rao, S.Y.: Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home. J. King Saud Univ.-Comput. Inf. Sci. 34(7), 4022\u20134030 (2022)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-44647-8_8","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"P MacKenzie","year":"2001","unstructured":"MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 137\u2013154. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_8"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Rosulek, M., Zhang, Y.: Fast and secure three-party computation: The garbled circuit approach. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 591\u2013602 (2015)","DOI":"10.1145\/2810103.2813705"},{"key":"1_CR22","unstructured":"Nicolosi, A., Krohn, M.N., Dodis, Y., Mazieres, D.: Proactive two-party signatures for user authentication. In: NDSS (2003)"},{"issue":"4","key":"1_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09404-0","volume":"34","author":"A Patra","year":"2021","unstructured":"Patra, A., Ravi, D.: On the exact round complexity of secure three-party computation. J. Cryptol. 34(4), 1\u201377 (2021)","journal-title":"J. Cryptol."},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"CP Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239\u2013252. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_22"},{"issue":"4","key":"1_CR25","doi-asserted-by":"publisher","first-page":"3663","DOI":"10.1109\/JIOT.2020.2974264","volume":"7","author":"KA Shim","year":"2020","unstructured":"Shim, K.A., Park, C.M., Koo, N., Seo, H.: A high-speed public-key signature scheme for 8-b IoT-constrained devices. IEEE Internet Things J. 7(4), 3663\u20133677 (2020)","journal-title":"IEEE Internet Things J."},{"key":"1_CR26","unstructured":"Slotta, D.: Annual growth rate of internet-of-things (IoT) connections in China from 2016 to 2018 with a forecast until 2025. https:\/\/www.statista.com\/statistics\/1194809\/china-growth-of-iot-connection-number\/. Accessed 3 Aug 2022"},{"key":"1_CR27","unstructured":"Slotta, D.: Market size of internet-of-things (IoT) in China from 2009 to 2020 with an estimate until 2025. https:\/\/www.statista.com\/statistics\/972077\/china-internet-of-things-iot-market-size\/. Accessed 3 Aug 2022"},{"key":"1_CR28","unstructured":"Slotta, D.: Number of internet-of-things (IoT) connections in China in 2015 and 2020 with estimates until 2025. https:\/\/www.statista.com\/statistics\/1026076\/china-number-of-iot-connections\/. Accessed 3 Aug 2022"},{"issue":"3","key":"1_CR29","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1109\/TCC.2019.2902380","volume":"9","author":"J Sun","year":"2019","unstructured":"Sun, J., Su, Y., Qin, J., Hu, J., Ma, J.: Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Trans. Cloud Comput. 9(3), 1195\u20131209 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"1_CR30","unstructured":"Vailshery, L.S.: Number of internet of things (IoT) connected devices worldwide from 2019 to 2030. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/. Accessed 3 Aug 2022"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Wang, H., Ma, W., Deng, F., Zheng, H., Wu, Q.: Dynamic threshold ECDSA signature and application to asset custody in blockchain. J. Inf. Secur. Appl. 61, 102805 (2021)","DOI":"10.1016\/j.jisa.2021.102805"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Xue, H., Au, M.H., Xie, X., Yuen, T.H., Cui, H.: Efficient online-friendly two-party ECDSA signature. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 558\u2013573 (2021)","DOI":"10.1145\/3460120.3484803"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"6","key":"1_CR34","doi-asserted-by":"publisher","first-page":"5271","DOI":"10.1109\/JIOT.2018.2865247","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., He, D., Zeadally, S., Wang, D., Choo, K.K.R.: Efficient and provably secure distributed signing protocol for mobile devices in wireless networks. IEEE Internet Things J. 5(6), 5271\u20135280 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23098-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:09:15Z","timestamp":1672762155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23098-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031230974","9783031230981"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23098-1_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19, EISA 2022 was held fully online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}