{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:26Z","timestamp":1740097226580,"version":"3.37.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_8","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T10:26:20Z","timestamp":1458642380000},"page":"114-129","source":"Crossref","is-referenced-by-count":6,"title":["Attribute-Based Signatures with Controllable Linkability"],"prefix":"10.1007","author":[{"given":"Miguel","family":"Urquidi","sequence":"first","affiliation":[]},{"given":"Dalia","family":"Khader","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Lancrenon","sequence":"additional","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10207-013-0191-z","volume":"12","author":"D Bernhard","year":"2013","unstructured":"Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N.P., Warinschi, B.: Anonymous attestation with user-controlled linkability. Int. J. Inf. Secur. 12(3), 219\u2013249 (2013)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1952982.1952986","volume":"14","author":"JM Bohli","year":"2011","unstructured":"Bohli, J.M., Pashalidis, A.: Relations among privacy notions. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 4 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56\u201373. Springer, Heidelberg (2004). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-540-24676-3_4"},{"key":"8_CR4","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132\u2013145. ACM, New York (2004). \n                      http:\/\/doi.acm.org\/10.1145\/1030083.1030103"},{"issue":"12","key":"8_CR5","first-page":"2899","volume":"7","author":"S Changxia","year":"2012","unstructured":"Changxia, S., Wenping, M.: Secure attribute-based threshold signature without a trusted central authority. Spec. Issue Adv. Comput. Electron. Eng. 7(12), 2899 (2012)","journal-title":"Spec. Issue Adv. Comput. Electron. Eng."},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). \n                      http:\/\/dx.doi.org\/10.1007\/3-540-46416-6_22"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/978-3-319-12280-9_17","volume-title":"Cryptology and Network Security","author":"A Kaafarani El","year":"2014","unstructured":"El Kaafarani, A., Chen, L., Ghadafi, E., Davenport, J.: Attribute-based signatures with user-controlled linkability. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 256\u2013269. Springer, Heidelberg (2014). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-12280-9_17"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-04852-9_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"A Kaafarani El","year":"2014","unstructured":"El Kaafarani, A., Ghadafi, E., Khader, D.: Decentralized traceable attribute-based signatures. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 327\u2013348. Springer, Heidelberg (2014). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-04852-9_17"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-36334-4_19","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2012","author":"M Gagn\u00e9","year":"2013","unstructured":"Gagn\u00e9, M., Narayan, S., Safavi-Naini, R.: Short pairing-efficient threshold-attribute-based signature. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol. 7708, pp. 295\u2013313. Springer, Heidelberg (2013). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-36334-4_19"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/978-3-319-16715-2_21","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"E Ghadafi","year":"2015","unstructured":"Ghadafi, E.: Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 391\u2013409. Springer, Heidelberg (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-16715-2_21"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-78967-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J Groth","year":"2008","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415\u2013432. Springer, Heidelberg (2008). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-540-78967-3_24"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-27954-6_4","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"J Herranz","year":"2012","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., R\u00e0fols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51\u201367. Springer, Heidelberg (2012). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-27954-6_4"},{"issue":"6","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TIFS.2015.2390497","volume":"10","author":"JY Hwang","year":"2015","unstructured":"Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10(6), 1109\u20131124 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Short group signatures with controllable linkability. In: 2011 Workshop on Lightweight Security Privacy: Devices, Protocols and Applications (LightSec), pp. 44\u201352, March 2011","DOI":"10.1109\/LightSec.2011.12"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.ins.2012.07.065","volume":"222","author":"JY Hwang","year":"2013","unstructured":"Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Group signatures with controllable linkability for dynamic membership. Inf. Sci. 222, 761\u2013778 (2013). \n                      http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025512005373\n                      \n                    , including Special Section on New Trends in Ambient Intelligence and Bio-inspired Systems","journal-title":"Inf. Sci."},{"key":"8_CR16","unstructured":"Khader, D.: Attribute-based group signature with revocation (2007)"},{"key":"8_CR17","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance (2008)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-19074-2_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"HK Maji","year":"2011","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376\u2013392. Springer, Heidelberg (2011). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-19074-2_24"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-19379-8_3","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"T Okamoto","year":"2011","unstructured":"Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35\u201352. Springer, Heidelberg (2011). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-19379-8_3"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-36362-7_9","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"T Okamoto","year":"2013","unstructured":"Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 125\u2013142. Springer, Heidelberg (2013). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-36362-7_9"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Park, H., Kent, S.: Traceable anonymous certificate (2009)","DOI":"10.17487\/rfc5636"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-02384-2_13","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"SF Shahandashti","year":"2009","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198\u2013216. Springer, Heidelberg (2009). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-02384-2_13"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-20810-7_10","volume-title":"Data and Applications Security and Privacy XXIX","author":"SR Tate","year":"2015","unstructured":"Tate, S.R., Vishwanathan, R.: Expiration and revocation of keys for attribute-based signatures. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 153\u2013169. Springer, Heidelberg (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-20810-7_10"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:29:14Z","timestamp":1559410154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}