{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:26:23Z","timestamp":1725870383809},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_7","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"94-109","source":"Crossref","is-referenced-by-count":1,"title":["Practical Signature Scheme from $$\\varGamma $$ \u0393 -Protocol"],"prefix":"10.1007","author":[{"given":"Zhoujun","family":"Ma","sequence":"first","affiliation":[]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1023\/A:1014927327846","volume":"25","author":"I Biehl","year":"2002","unstructured":"Biehl, I., Buchmann, J., Hamdy, S., Meyer, A.: A signature scheme based on the intractability of computing roots. Des. Codes Crypt. 25(3), 223\u2013236 (2002)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"7_CR2","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10623-003-6154-z","volume":"35","author":"DR Brown","year":"2005","unstructured":"Brown, D.R.: Generic groups, collision resistance, and ecdsa. Des. Codes Crypt. 35(1), 119\u2013152 (2005)","journal-title":"Des. Codes Crypt."},{"key":"7_CR3","unstructured":"Cramer, R.: Modular design of secure yet practical cryptographic protocol. Ph.D. thesis, University of Amsterdam (1996)"},{"key":"7_CR4","unstructured":"Hess, E., Schafheutle, M., Serf, P., et al.: The digital signature scheme ECGDSA. Citeseer (2006)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Horster, P., Petersen, H., Michels, M.: Meta-ELGamal signature schemes. In: Proceedings of the 2nd ACM Conference on Computer and communications security, pp. 96\u2013107. ACM (1994)","DOI":"10.1145\/191177.191197"},{"key":"7_CR6","unstructured":"ISO. Information technology \u2013 security techniques \u2013 digital signatures with appendix \u2013 part 3: discrete logarithm based mechanisms. ISO, International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"7_CR7","unstructured":"ISO. Information technology \u2013 trusted platform module library. ISO, International Organization for Standardization, Geneva, Switzerland (2015)"},{"issue":"1","key":"7_CR8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol Version 2 (IKEv2). RFC 5996 (Proposed Standard), September 2010. Obsoleted by RFC 7296, updated by RFCs 5998, 6989","DOI":"10.17487\/rfc5996"},{"issue":"1","key":"7_CR10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3934\/amc.2007.1.13","volume":"1","author":"N Koblitz","year":"2007","unstructured":"Koblitz, N., Menezes, A.: Another look at generic groups. Adv. Math. Commun. 1(1), 13 (2007)","journal-title":"Adv. Math. Commun."},{"key":"7_CR11","unstructured":"Kravitz, D.: Digital signature algorithm, July 27 1993. US Patent 5,231,668"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u2018SIGn-and-MAc\u2019 approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_24"},{"issue":"4","key":"7_CR13","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/S0045-7906(99)00011-7","volume":"25","author":"CH Lim","year":"1999","unstructured":"Lim, C.H., Lee, P.J.: The Korean certificate-based digital signature algorithm. Comput. Electr. Eng. 25(4), 249\u2013265 (1999)","journal-title":"Comput. Electr. Eng."},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-319-12087-4_22","volume-title":"Information Security and Cryptology","author":"M Liu","year":"2014","unstructured":"Liu, M., Chen, J., Li, H.: Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 343\u2013358. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12087-4_22"},{"key":"7_CR15","unstructured":"Office of State Commercial Cryptography Administration. Public key cryptographic algorithm SM2 based on elliptic curves (in Chinese) (2010). http:\/\/www.oscca.gov.cn\/UpFile\/2010122214822692.pdf"},{"issue":"3","key":"7_CR16","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C-P Schnorr","year":"1991","unstructured":"Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-49649-1_10","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201998","author":"JH Silverman","year":"1998","unstructured":"Silverman, J.H., Suzuki, J.: Elliptic curve discrete logarithms and the index calculus. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 110\u2013125. Springer, Heidelberg (1998). doi: 10.1007\/3-540-49649-1_10"},{"issue":"2","key":"7_CR18","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/TIFS.2012.2232653","volume":"8","author":"AC-C Yao","year":"2013","unstructured":"Yao, A.C.-C., Zhao, Y.: Online\/offline signatures for low-power devices. IEEE Trans. Inf. Forensics Secur. 8(2), 283\u2013294 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-27152-1_7","volume-title":"Security Standardisation Research","author":"Z Zhang","year":"2015","unstructured":"Zhang, Z., Yang, K., Zhang, J., Chen, C.: Security of the SM2 signature scheme against generalized key substitution attacks. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 140\u2013153. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-27152-1_7"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T03:45:21Z","timestamp":1601178321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}