{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T05:12:02Z","timestamp":1746249122460,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_26","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"321-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Lattice-Based Proxy Signature with Message Recovery"],"prefix":"10.1007","author":[{"given":"Faguo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"issue":"9","key":"26_CR1","first-page":"1338","volume":"79","author":"M Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. A 79(9), 1338\u20131354 (1996)","journal-title":"IEICE Trans. Fundam. A"},{"issue":"3","key":"26_CR2","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1007\/s11277-014-2087-2","volume":"80","author":"R Kumar","year":"2015","unstructured":"Kumar, R., Verma, H.K., Dhir, R.: Analysis and design of protocol for enhanced threshold proxy signature scheme based on rsa for known signers. Wirel. Pers. Commun. 80(3), 1281\u20131345 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Xiao, Y.M.: Improvement of an Eliptic curve based threshold proxy signature scheme (2016)","DOI":"10.1051\/matecconf\/20164402017"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum Entanglement and Quantum Information-Proceedings of Ccast, pp. 303\u2013332 (1999)","DOI":"10.1137\/S0036144598347011"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-34601-9_9","volume-title":"Network and System Security","author":"S Tang","year":"2012","unstructured":"Tang, S., Xu, L.: Proxy signature scheme based on isomorphisms of polynomials. In: Xu, L., Bertino, E., Mu, Y. (eds.) NSS 2012. LNCS, vol. 7645, pp. 113\u2013125. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34601-9_9"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Yang, C., Qiu, P., Zheng, S., Wang, L.: An efficient lattice-based proxy signature scheme without trapdoor. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 189\u2013194 (2016)","DOI":"10.1109\/IIH-MSP.2015.90"},{"issue":"4","key":"26_CR7","first-page":"1325","volume":"54","author":"YZ Chen","year":"2011","unstructured":"Chen, Y.Z., Liu, Y., Wen, X.J.: A quantum proxy weak blind signature scheme. Chin. J. Quantum Electron. 54(4), 1325\u20131333 (2011)","journal-title":"Chin. J. Quantum Electron."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, L., Ma, Y.: A lattice-based identity-based proxy blind signature scheme in the standard model. Math. Probl. Eng. 2014(1) (2014)","DOI":"10.1155\/2014\/307637"},{"issue":"2","key":"26_CR9","first-page":"1","volume":"55","author":"TY Wang","year":"2015","unstructured":"Wang, T.Y., Wei, Z.L.: Analysis of forgery attack on one-time proxy signature and the improvement. Int. J. Theor. Phys. 55(2), 1\u20133 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. In: IEEE Symposium on Foundations of Computer Science, pp. 372\u2013381 (2004)","DOI":"10.1109\/FOCS.2004.72"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS 1993, Fairfax, Virginia, USA, pp. 58\u201361. November 1993","DOI":"10.1145\/168588.168595"},{"issue":"5","key":"26_CR12","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1002\/dac.1188","volume":"24","author":"P Simoens","year":"2011","unstructured":"Simoens, P., Vankeirsbilck, B., Deboosere, L., Ali, F.A., Turck, F.D., Dhoedt, B., Demeester, P.: Upstream bandwidth optimization of thin client protocols through latency-aware adaptive user event buffering. Int. J. Commun. Syst. 24(5), 666\u2013690 (2011)","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"26_CR13","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1002\/dac.2412","volume":"26","author":"CX Liu","year":"2013","unstructured":"Liu, C.X., Liu, Y., Zhang, Z.J., Cheng, Z.Y.: High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int. J. Commun. Syst. 26(3), 380\u2013394 (2013)","journal-title":"Int. J. Commun. Syst."},{"key":"26_CR14","volume-title":"ECDLP-Based Certificateless Proxy Signature Scheme with Message Recovery","author":"S Padhye","year":"2015","unstructured":"Padhye, S., Tiwari, N.: ECDLP-Based Certificateless Proxy Signature Scheme with Message Recovery. Wiley, Hoboken (2015)"},{"issue":"9","key":"26_CR15","first-page":"151","volume":"9","author":"C Zhou","year":"2015","unstructured":"Zhou, C.: An improved ID-based proxy signature scheme with message recovery. Int. J. Secur. Appl. 9(9), 151\u2013164 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"26_CR16","volume-title":"A Short ID-Based Proxy Signature Scheme","author":"MR Asaar","year":"2016","unstructured":"Asaar, M.R., Salmasizadeh, M., Susilo, W.: A Short ID-Based Proxy Signature Scheme. Wiley, Hoboken (2016)"},{"issue":"6","key":"26_CR17","first-page":"84","volume":"38","author":"F Xia","year":"2011","unstructured":"Xia, F., Yang, B., Ma, S., Sun, W.W., Zhang, M.W.: Lattice-based proxy signature scheme. J. Hunan Univ. 38(6), 84\u201388 (2011)","journal-title":"J. Hunan Univ."},{"issue":"1","key":"26_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JCN.2013.000003","volume":"15","author":"KS Kim","year":"2013","unstructured":"Kim, K.S., Hong, D., Jeong, I.R.: Identity-based proxy signature from lattices. J. Commun. Netw. 15(1), 1\u20137 (2013)","journal-title":"J. Commun. Netw."},{"key":"26_CR19","unstructured":"Jiang, M.M., Yupu, H.U., Baocang, Y.U., Lai, J.J.: Efficient lattice-based proxy signature. J. Beijing Univ. Posts Telecommun. (2014)"},{"issue":"3\/4","key":"26_CR20","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1504\/IJESDF.2013.058658","volume":"5","author":"M Tian","year":"2013","unstructured":"Tian, M., Huang, L.: Lattice-based message recovery signature schemes. Int. J. Electron. Secur. Digit. Forensics 5(3\/4), 257\u2013269 (2013)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-3-642-29011-4_43","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"V Lyubashevsky","year":"2012","unstructured":"Lyubashevsky, V.: Lattice signatures without trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738\u2013755. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_43"},{"issue":"3","key":"26_CR22","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1145\/1151690.1151692","volume":"24","author":"KC Barr","year":"2006","unstructured":"Barr, K.C.: Energy-aware lossless data compression. ACM Trans. Comput. Syst. 24(3), 250\u2013291 (2006)","journal-title":"ACM Trans. Comput. Syst."},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Generating hard instance of lattice problems. In: Twenty-Eighth ACM Symposium on Theory of Computing ACM, pp. 99\u2013108 (1996)","DOI":"10.1145\/237814.237838"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, pp. 390\u2013399, October 30\u2013November 03 2006","DOI":"10.1145\/1180405.1180453"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:27:35Z","timestamp":1570447655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}