{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:12:53Z","timestamp":1743095573307,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757563"},{"type":"electronic","value":"9783031757570"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75757-0_2","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"23-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anonymous, Timed and\u00a0Revocable Proxy Signatures"],"prefix":"10.1007","author":[{"given":"Ghada","family":"Almashaqbeh","sequence":"first","affiliation":[]},{"given":"Anca","family":"Nitulescu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-981-99-7563-1_3","volume-title":"Cryptology and Network Security","author":"I Afia","year":"2023","unstructured":"Afia, I., AlTawy, R.: Traceable policy-based signatures with delegation. In: Deng, J., Kolesnikov, V., Schwarzmann, A.A. (eds.) CANS 2023. LNCS, vol. 14342, pp. 51\u201372. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7563-1_3"},{"key":"2_CR2","unstructured":"Almashaqbeh, G., Nitulescu, A.: Anonymous, timed and revocable proxy signatures. Cryptology ePrint Archive (2023). https:\/\/eprint.iacr.org\/2023\/833"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: CCS (2005)","DOI":"10.1145\/1102120.1102161"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-662-49384-7_14","volume-title":"Public-Key Cryptography \u2013 PKC 2016","author":"M Backes","year":"2016","unstructured":"Backes, M., Meiser, S., Schr\u00f6der, D.: Delegatable functional signatures. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9614, pp. 357\u2013386. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49384-7_14"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-031-15985-5_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2022","author":"M Bellare","year":"2022","unstructured":"Bellare, M., Crites, E., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Better than advertised security for non-interactive threshold signatures. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022. LNCS, vol. 13510, pp. 517\u2013550. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_18"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework\u00a0for\u00a0code-based\u00a0game-playing\u00a0proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409\u2013426. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_25"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/bfb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998(1998)","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/bfb0054122"},{"key":"2_CR8","unstructured":"Bobolz, J., Diaz, J., Kohlweiss, M.: Foundations of anonymous signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Financial Cryptography and Data Security (2024)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00145-010-9082-x","volume":"25","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57\u2013115 (2012)","journal-title":"J. Cryptol."},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-26948-7_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"D Boneh","year":"2019","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 561\u2013586. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_20"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"Boyle, E., Gold","DOI":"10.1007\/978-3-642-54631-0_29","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"E Boyle","year":"2014","unstructured":"Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, p. Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: PKC (2014)-519. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54631-0_29"},{"key":"2_CR12","unstructured":"Crites, E., Komlo, C., Maller, M.: How to prove Schnorr assuming Schnorr: security of multi-and threshold signatures. Cryptology ePrint Archive (2021)"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"455","DOI":"10.15388\/Informatica.2004.072","volume":"15","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: An efficient proxy signature scheme with revocation. Informatica 15(4), 455\u2013464 (2004)","journal-title":"Informatica"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-662-43936-4_4","volume-title":"Data and Applications Security and Privacy XXVIII","author":"D Derler","year":"2014","unstructured":"Derler, D., Hanser, C., Slamanig, D.: Privacy-enhancing proxy signatures from non-interactive anonymous credentials. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 49\u201365. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43936-4_4"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-031-47754-6_15","volume-title":"Financial Cryptography and Data Security","author":"N D\u00f6ttling","year":"2023","unstructured":"D\u00f6ttling, N., Hanzlik, L., Magri, B., Wohnig, S.: McFly: verifiable encryption to the future made practical. In: Baldimtsi, F., Cachin, C. (eds.) FC 2023. LNCS, vol. 13950, pp. 252\u2013269. Springer, Cham. (2023). https:\/\/doi.org\/10.1007\/978-3-031-47754-6_15"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: CCS (1998)","DOI":"10.1145\/288090.288111"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-85855-3_14","volume-title":"Security and Cryptography for Networks","author":"G Fuchsbauer","year":"2008","unstructured":"Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201\u2013217. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85855-3_14"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-02002-5_6","volume-title":"Formal to Practical Security","author":"G Fuchsbauer","year":"2009","unstructured":"Fuchsbauer, G., Pointcheval, D.: Anonymous consecutive delegation of signing rights: unifying group and proxy signatures. In: Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security. LNCS, vol. 5458, pp. 95\u2013115. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02002-5_6"},{"key":"2_CR19","unstructured":"Gailly, N., Melissaris, K., Romailler, Y.: tlock: Practical timelock encryption from threshold BLS. Cryptology ePrint Archive, Paper 2023\/189 (2023)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Hanser, C., Slamanig, D.: Blank digital signatures. In: ASIA CCS (2013)","DOI":"10.1145\/2484313.2484324"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-03515-4_5","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"C Hanser","year":"2013","unstructured":"Hanser, C., Slamanig, D.: Warrant-hiding delegation-by-certificate proxy signature schemes. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 60\u201377. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03515-4_5"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-45126-6_21","volume-title":"Financial Cryptography","author":"J Herranz","year":"2003","unstructured":"Herranz, J., S\u00e1ez, G.: Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 286\u2013302. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45126-6_21"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/bfb0028478","volume-title":"Information and Communications Security","author":"S Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223\u2013232. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/bfb0028478"},{"key":"2_CR24","unstructured":"Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol.\u00a02001, pp. 603\u2013608 (2001)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/3-540-36563-x_5","volume-title":"Topics in Cryptology \u2014 CT-RSA 2003","author":"JY Lee","year":"2003","unstructured":"Lee, J.Y., Cheon, J.H., Kim, S.: An analysis of proxy signatures: Is a secure channel necessary? In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 68\u201379. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36563-x_5"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-72738-5_17","volume-title":"Applied Cryptography and Network Security","author":"J Li","year":"2007","unstructured":"Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 253\u2013269. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_17"},{"issue":"3","key":"2_CR27","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1016\/j.comcom.2010.05.015","volume":"34","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Hu, Y., Zhang, X., Ma, H.: Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3), 494\u2013501 (2011)","journal-title":"Comput. Commun."},{"issue":"3","key":"2_CR28","first-page":"799","volume":"161","author":"EJL Lu","year":"2005","unstructured":"Lu, E.J.L., Hwang, M.S., Huang, C.J.: A new proxy signature scheme with revocation. Appl. Math. Comput. 161(3), 799\u2013806 (2005)","journal-title":"Appl. Math. Comput."},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"Malkin, T., Oba","DOI":"10.1007\/978-3-540-24676-3_19","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"T Malkin","year":"2004","unstructured":"Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, p. Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: EUROCRYPT (2004)-322. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_19"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: CCS (1996)","DOI":"10.1145\/238168.238185"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/3-540-47790-X_21","volume-title":"Information Security","author":"T Okamoto","year":"1999","unstructured":"Okamoto, T., Tada, M., Okamoto, E.: Extended proxy signatures for smart cards. In: ISW 1999. LNCS, vol. 1729, pp. 247\u2013258. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-47790-X_21"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-30840-1_2","volume-title":"Information Security and Cryptology - ICISC 2015","author":"H Morita","year":"2016","unstructured":"Morita, H., Schuldt, J.C.N., Matsuda, T., Hanaoka, G., Iwata, T.: On the security of the Schnorr signature scheme and DSA against related-key attacks. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 20\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30840-1_2"},{"key":"2_CR33","unstructured":"Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: International Conference on Distributed Computing Systems (1993)"},{"issue":"3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-78440-1_9","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"JCN Schuldt","year":"2008","unstructured":"Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141\u2013161. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78440-1_9"},{"issue":"6","key":"2_CR36","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1049\/ip-cdt:20000888","volume":"147","author":"HM Sun","year":"2000","unstructured":"Sun, H.M.: Design of time-stamped proxy signatures with traceable receivers. IEE Proc.-Comput. Digit. Tech. 147(6), 462\u2013466 (2000)","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"issue":"5","key":"2_CR37","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1049\/ip-cdt:19990647","volume":"146","author":"HM Sun","year":"1999","unstructured":"Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signatures. IEE Proc.-Comput. Digit. Tech. 146(5), 259\u2013263 (1999)","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"2_CR38","unstructured":"Varadharajan, V., Allen, P., Black, S.: An analysis of the proxy problem in distributed systems. In: IEEE Computer Society Symposium on Research in Security and Privacy (1991)"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-540-40061-5_32","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"H Wang","year":"2003","unstructured":"Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507\u2013522. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_32"},{"key":"2_CR40","unstructured":"Wuille, P., Nick, J., Ruffing, T.: Schnorr signatures for secp256k1. Bitcoin Improvement Proposal 340 (2020)"},{"key":"2_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-40367-0_2","volume-title":"Information Security and Privacy","author":"S Xu","year":"2016","unstructured":"Xu, S., Yang, G., Mu, Y., Ma, S.: Proxy signature with revocation. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 21\u201336. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40367-0_2"},{"key":"2_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312\u2013323. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-45067-X_27"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75757-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:34Z","timestamp":1729595014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75757-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757563","9783031757570"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75757-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}