{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:40:08Z","timestamp":1749688808828,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_13","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"182-193","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy Preserving Source Verifiable Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Zhongyuan","family":"Yao","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/984334.984335","volume":"7","author":"G Ateniese","year":"2004","unstructured":"Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM TISSEC 7(1), 1\u201320 (2004)","journal-title":"ACM TISSEC"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255\u2013270. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44598-6_16"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/10721064_19","volume-title":"Smart Card Research and Applications","author":"F Bao","year":"2000","unstructured":"Bao, F.: An efficient verifiable encryption scheme for encryption of discrete logarithms. In: Quisquater, J.-J., Schneier, B. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 213\u2013220. Springer, Heidelberg (2000). doi: 10.1007\/10721064_19"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201998","author":"M Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26\u201345. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055718"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-642-19379-8_25","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"O Blazy","year":"2011","unstructured":"Blazy, O., Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Signatures on randomizable ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 403\u2013422. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19379-8_25"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D.: The decision Diffie-Hellman problem. In: Third International Symposium Algorithmic Number Theory, pp. 48\u201363 (1998)","DOI":"10.1007\/BFb0054851"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-44448-3_25","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"J Camenisch","year":"2000","unstructured":"Camenisch, J., Damg\u00e5rd, I.: Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 331\u2013345. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44448-3_25"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-45146-4_8","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J Camenisch","year":"2003","unstructured":"Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126\u2013144. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_8"},{"issue":"2","key":"13_CR9","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/TC.2012.188","volume":"63","author":"TW Chim","year":"2014","unstructured":"Chim, T.W., Yiu, S., Hui, L.C., Li, V.O.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63(2), 510\u2013524 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-540-24676-3_36","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609\u2013626. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_36"},{"key":"13_CR11","unstructured":"Fuchsbauer, G.: Commuting signatures and verifiable encryption and an application to non-interactively delegatable credentials. IACR Cryptology ePrint Archive 2010, 233 (2010)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-45861-1_20","volume-title":"Information Security and Cryptology \u2014 ICISC 2001","author":"N Gonz\u00e1lez-Deleito","year":"2002","unstructured":"Gonz\u00e1lez-Deleito, N., Markowitch, O.: An optimistic multi-party fair exchange protocol with reduced trust requirements. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 258\u2013267. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45861-1_20"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-662-46803-6_9","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Groth","year":"2015","unstructured":"Groth, J., Kohlweiss, M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 253\u2013280. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46803-6_9"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-32805-3_22","volume-title":"Communications and Multimedia Security","author":"J Hajny","year":"2012","unstructured":"Hajny, J., Malina, L.: Practical revocable anonymous credentials. In: Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol. 7394, pp. 211\u2013213. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32805-3_22"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Halkes, G.P., Pouwelse, J.A.: Verifiable encryption for p2p block exchange. In: IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), pp. 1\u20134. IEEE (2010)","DOI":"10.1109\/P2P.2010.5569993"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BFb0030428","volume-title":"Information Security","author":"S Kim","year":"1998","unstructured":"Kim, S., Park, S., Won, D.: Group signatures for hierarchical multigroups. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 273\u2013281. Springer, Heidelberg (1998). doi: 10.1007\/BFb0030428"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/BFb0028496","volume-title":"Information and Communications Security","author":"W Mao","year":"1997","unstructured":"Mao, W.: Publicly verifiable partial key escrow. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 409\u2013413. Springer, Heidelberg (1997). doi: 10.1007\/BFb0028496"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Park, J., Chong, E.K.P., Siegel, H.J.: Constructing fair-exchange protocols for e-commerce via distributed computation of RSA signatures. In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, pp. 172\u2013181 (2003)","DOI":"10.1145\/872035.872060"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Ren, J., Li, Y., Li, T.: Providing source privacy in mobile ad hoc networks. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, pp. 332\u2013341. IEEE (2009)","DOI":"10.1109\/MOBHOC.2009.5336980"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45682-1_32"},{"issue":"2","key":"13_CR21","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Stadler","year":"1996","unstructured":"Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 190\u2013199. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68339-9_17"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-03007-9_17","volume-title":"Data and Applications Security XXIII","author":"SR Tate","year":"2009","unstructured":"Tate, S.R., Vishwanathan, R.: Improving cut-and-choose in verifiable encryption and fair exchange protocols using trusted computing technology. In: Gudes, E., Vaidya, J. (eds.) DBSec 2009. LNCS, vol. 5645, pp. 252\u2013267. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03007-9_17"},{"issue":"2","key":"13_CR24","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MCI.2008.919071","volume":"3","author":"J Zhan","year":"2008","unstructured":"Zhan, J.: Privacy-preserving collaborative data mining. IEEE Comput. Intell. Mag. 3(2), 31\u201341 (2008)","journal-title":"IEEE Comput. Intell. Mag."},{"issue":"5","key":"13_CR25","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TIFS.2016.2515513","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Chen, Q., Zhong, S.: Privacy-preserving data aggregation in mobile phone sensing. IEEE Trans. Inf. Forensics Secur. 11(5), 980\u2013992 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:40Z","timestamp":1749686440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}