{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:53:35Z","timestamp":1743072815166,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031455124"},{"type":"electronic","value":"9783031455131"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45513-1_7","type":"book-chapter","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T22:01:53Z","timestamp":1696975313000},"page":"115-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SMHSDVS: A Secure and\u00a0Mutual Heterogeneous Strong Designated Signature Between PKI and\u00a0IBC"],"prefix":"10.1007","author":[{"given":"Yibing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoxiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chin-tser","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dejun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Binhao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143\u2013154. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_13"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11432-010-0061-5","volume":"53","author":"YX Sun","year":"2010","unstructured":"Sun, Y.X., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inform. Sci. 53(3), 557\u2013566 (2010). https:\/\/doi.org\/10.1007\/s11432-010-0061-5","journal-title":"Sci. China Inform. Sci."},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/JSYST.2012.2221897","volume":"7","author":"F Li","year":"2013","unstructured":"Li, F., Zhang, H., Takagi, T.: Efficient signcryption for heterogeneous systems. IEEE Syst. J. 7(3), 420\u2013429 (2013)","journal-title":"IEEE Syst. J."},{"issue":"10","key":"7_CR4","first-page":"2432","volume":"44","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Zhang, L., Zhang, Y., Wang, H., Wang, C.: CLPKC to TPKI heterogeneous signature scheme with Anonymity. Acta Electron. Sin. 44(10), 2432\u20132439 (2016)","journal-title":"Acta Electron. Sin."},{"issue":"4","key":"7_CR5","first-page":"881","volume":"39","author":"C Wang","year":"2017","unstructured":"Wang, C., Li, Y., Zhang, Y., Niu, S.: Efficient Signcryption scheme under the Standard Model. J. Electron. Inf. Technol. 39(4), 881\u2013886 (2017)","journal-title":"J. Electron. Inf. Technol."},{"issue":"9","key":"7_CR6","first-page":"2127","volume":"39","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Zhang, L., Wang, C., Ma, Y., Zhang, Y.: Provable secure IDPKC-to-CLPKC hetero-geneous signcryption scheme. Electron. Inf. Technol 39(9), 2127\u20132133 (2017)","journal-title":"Electron. Inf. Technol"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Wang, C., Liu, C., Li, Y., Niu, S., Zhang, Y.: Bidirectional anonymous heterogeneous signature scheme based on PKI and IBC. J. Commun. 38(10), 10\u201317(2017). https:\/\/doi.org\/10.11959\/J.issn.1000-436x.2017194","DOI":"10.11959\/J.issn.1000-436x.2017194"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"7854","DOI":"10.1109\/Access.2018.2797102","volume":"1\u20131","author":"J Liu","year":"2018","unstructured":"Liu, J., Zhang, L., Sun, R., Du, X., Guizani, M.: Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings. IEEE Access 1\u20131(6), 7854\u20137863 (2018). https:\/\/doi.org\/10.1109\/Access.2018.2797102","journal-title":"IEEE Access"},{"issue":"8","key":"7_CR9","first-page":"1787","volume":"41","author":"S Cao","year":"2019","unstructured":"Cao, S., Lang, X., Liu, X., Wang, C., Zhang, Y.: Improvement of a Verifiable and secure bidirec-tional anonymous heterogeneous signature scheme for PKI and IBC. J. Electron. Inf. Technol. 41(8), 1787\u20131792 (2019)","journal-title":"J. Electron. Inf. Technol."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Xiong, H., Wu, Y., Jin, C., et al.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 7(12), 11713\u201311724 (2020)","DOI":"10.1109\/JIOT.2020.2999510"},{"key":"7_CR11","first-page":"89","volume":"33","author":"X Yang","year":"2015","unstructured":"Yang, X., Zhang, Y., Deng, Z.: Research on trusted Two-Dimensional Code Technology based on PKI. Sci. Technol. Innov. Appl. 33, 89\u201390 (2015)","journal-title":"Sci. Technol. Innov. Appl."},{"key":"7_CR12","unstructured":"Sun, S.: A random individual digital signature authentication scheme. Inform. Security Technol. 6(7), 29\u201330+37 (2015)"},{"issue":"11","key":"7_CR13","first-page":"295","volume":"32","author":"P Zhen","year":"2015","unstructured":"Zhen, P., Zhao, G., Min, L., Li, X.: A forward secure digital Signature scheme based on identity. Comput. Appl. Softw. 32(11), 295\u2013298 (2015)","journal-title":"Comput. Appl. Softw."},{"key":"7_CR14","first-page":"1978","volume":"9","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Xiao, H., Wang, J.: Efficient identity based on RSA multiple digital signature. J. Chin. Comput. Syst. 9, 1978\u20131981 (2018)","journal-title":"J. Chin. Comput. Syst."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-24691-6_4","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S Saeednia","year":"2004","unstructured":"Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) Information Security and Cryptology - ICISC 2003, pp. 40\u201354. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24691-6_4"},{"issue":"6","key":"7_CR16","first-page":"877","volume":"18","author":"S Pankaj","year":"2015","unstructured":"Pankaj, S., Amitabh, B.: Strong designated verifier signature scheme based on discrete logarithm problem. J. Discr. Math. Sci. Crypt. 18(6), 877\u2013885 (2015)","journal-title":"J. Discr. Math. Sci. Crypt."},{"key":"7_CR17","unstructured":"Xu, D., Yu, B.: A secure identity-based strongly specified verifier signature scheme. Comput. Sci. 43(4), 50\u201352+57 (2016)"},{"issue":"6","key":"7_CR18","first-page":"20","volume":"37","author":"H Du","year":"2016","unstructured":"Du, H., Wen, Q.: Multi signature based on Certificateless strong designated verifier. J. Commun. 37(6), 20\u201328 (2016)","journal-title":"J. Commun."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Shooshtari, M.K., Ahmadian-Attari, M., Aref, M.R.: Provably secure strong designated verifier signature scheme based on coding theory. Int. J. Commun. Syst. 30(7), e3162 (2017)","DOI":"10.1002\/dac.3162"},{"key":"7_CR20","unstructured":"Yue, F.: Research on efficient signature system of designated verifier and its application. University of Electronic Science and Technology (2016)"},{"key":"7_CR21","unstructured":"Ge, L.: Study on Strong Designated Verifier signature scheme. Xihua Universit (2017)"},{"key":"7_CR22","unstructured":"Yu, Z., Feng, H., Xu, H.: Strong designated verifier signature scheme based on identity in cloud storage of smart distribution network. Comput. Digital Eng. 46(10), 2042\u20132046+2088 (2018)"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"126391","DOI":"10.1109\/ACCESS.2019.2938898","volume":"7","author":"S Han","year":"2019","unstructured":"Han, S., Xie, M., Yang, B., et al.: A certificateless verifiable strong designated verifier signature scheme. IEEE Access 7, 126391\u2013126408 (2019)","journal-title":"IEEE Access"},{"issue":"1101","key":"7_CR24","first-page":"485","volume":"2020","author":"B Nayak","year":"2019","unstructured":"Nayak, B.: Elliptic curve cryptography-based signcryption scheme with a strong designated verifier for the internet. Mach. Learn. Inform. Process.: Proc. ICMLIP 2020(1101), 485 (2019)","journal-title":"Mach. Learn. Inform. Process.: Proc. ICMLIP"},{"issue":"1","key":"7_CR25","first-page":"10","volume":"7","author":"HY Lin","year":"2021","unstructured":"Lin, H.Y., Tsai, T.T., Ting, P.Y., et al.: An efficient strong designated multi-verifier signature scheme with shared verification[J]. Int. J. Technol. Eng. Stud. 7(1), 10\u201316 (2021)","journal-title":"Int. J. Technol. Eng. Stud."},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.ins.2018.12.020","volume":"479","author":"R Parvin","year":"2019","unstructured":"Parvin, R., Mehdi, B., Mohammad, D., Willy, S.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321\u2013334 (2019)","journal-title":"Inf. Sci."},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Xin, X., Li, F.: Secure and efficient quantum designated verifier signature scheme. Modern Phys. Lett. A, 35(18), 2050148 (2020). https:\/\/doi.org\/10.1142\/S0217732320501485","DOI":"10.1142\/S0217732320501485"},{"issue":"1","key":"7_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03387-4","volume":"21","author":"X Xin","year":"2022","unstructured":"Xin, X., Ding, L., Li, C., et al.: Quantum public-key designated verifier signature. Quantum Inf. Process. 21(1), 1\u201316 (2022)","journal-title":"Quantum Inf. Process."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 390\u2013399 (2006)","DOI":"10.1145\/1180405.1180453"},{"issue":"2","key":"7_CR30","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988). https:\/\/doi.org\/10.1137\/0217017","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45513-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:03:25Z","timestamp":1696982605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45513-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031455124","9783031455131"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45513-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2023.github.io\/ProvSec2023\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}