{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:43:24Z","timestamp":1743043404325,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_60","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"612-622","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud"],"prefix":"10.1007","author":[{"given":"Lifei","family":"Wei","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"60_CR1","doi-asserted-by":"crossref","unstructured":"Dong, M., Li, H., Ota, K., Zhu, H.: Hvsto: efficient privacy preserving hybrid storage in cloud data center. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014), pp. 529\u2013534 (2014)","DOI":"10.1109\/INFCOMW.2014.6849287"},{"issue":"4","key":"60_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCC.2014.85","volume":"1","author":"M Dong","year":"2014","unstructured":"Dong, M., Li, H., Ota, K., Yang, L.T., Zhu, H.: Multicloud-based evacuation services for emergency management. IEEE Cloud Comput. 1(4), 50\u201359 (2014)","journal-title":"IEEE Cloud Comput."},{"key":"60_CR3","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371\u2013386 (2014)","journal-title":"Inf. Sci."},{"issue":"2","key":"60_CR4","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM 2014, pp. 2121\u20132129 (2014)","DOI":"10.1109\/INFOCOM.2014.6848154"},{"key":"60_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28914-9_1","volume-title":"Theory of Cryptography","author":"JH Ahn","year":"2012","unstructured":"Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1\u201320. Springer, Heidelberg (2012)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2011), pp. 1060\u20131065 (2011)","DOI":"10.1109\/INFCOMW.2011.5928784"},{"issue":"1","key":"60_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00145-010-9082-x","volume":"25","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57\u2013115 (2012)","journal-title":"J. Cryptology"},{"key":"60_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"issue":"3","key":"60_CR10","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.jcss.2013.06.010","volume":"80","author":"Z Wang","year":"2014","unstructured":"Wang, Z., Sun, G., Chen, D.: A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3), 546\u2013553 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: IEEE CNS 2013, pp. 520\u2013524 (2013)","DOI":"10.1109\/CNS.2013.6682770"},{"issue":"1","key":"60_CR12","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.compeleceng.2008.05.005","volume":"35","author":"F Cao","year":"2009","unstructured":"Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86\u201395 (2009)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"60_CR13","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1002\/dac.2683","volume":"28","author":"RA Sahu","year":"2015","unstructured":"Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28(3), 497\u2013512 (2015)","journal-title":"Int. J. Commun. Syst."},{"key":"60_CR14","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2009","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2009)"},{"issue":"1","key":"60_CR15","first-page":"33","volume":"14","author":"Z Wang","year":"2012","unstructured":"Wang, Z., Wang, L., Zheng, S., Yang, Y., Hu, Z.: Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 14(1), 33\u201338 (2012)","journal-title":"Int. J. Netw. Secur."},{"issue":"11","key":"60_CR16","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1002\/dac.1330","volume":"25","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432\u20131442 (2012)","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"60_CR17","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.amc.2004.10.046","volume":"169","author":"X Li","year":"2005","unstructured":"Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437\u2013450 (2005)","journal-title":"Appl. Math. Comput."},{"key":"60_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-13013-7_28","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"A Bagherzandi","year":"2010","unstructured":"Bagherzandi, A., Jarecki, S.: Identity-based aggregate and multi-signature schemes based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 480\u2013498. Springer, Heidelberg (2010)"},{"key":"60_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-38348-9_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Joye","year":"2013","unstructured":"Joye, M., Libert, B.: Efficient cryptosystems from $$2^{k}$$-th power residue symbols. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 76\u201392. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T13:33:58Z","timestamp":1676468038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}