{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:00:13Z","timestamp":1777964413184,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540209966","type":"print"},{"value":"9783540246602","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_12","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"143-156","source":"Crossref","is-referenced-by-count":15,"title":["Server Assisted Signatures Revisited"],"prefix":"10.1007","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[]},{"given":"Nazife","family":"Baykal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)","DOI":"10.1145\/359340.359342"},{"key":"12_CR2","unstructured":"National Institute for Standards and Technology: Digital Signature Standard (DSS), Federal Register, 56(169), August 30 (1991)"},{"key":"12_CR3","unstructured":"National Institute of Standards and Technology: FIPS Publication 180: Secure Hash Standard (SHS), May 11 (1993)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm. Internet Request for Comments. RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11) (1981)","DOI":"10.1145\/358790.358797"},{"key":"12_CR6","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International (October 1979)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Tsudik, G., Tung, B.: How to construct optimal one-time signatures. Computer Networks (Elsevier) 43(3) (October 2003)","DOI":"10.1016\/S1389-1286(03)00285-8"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"S. Even","year":"1990","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 263\u2013275. Springer, Heidelberg (1990)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"R.C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy- Based Security Protocols in Networked Mobile Devices. In: Proceedings of the 17th ACM Symposium on Applied Computing (Security Track) (March 2002)","DOI":"10.1145\/508791.508845"},{"key":"12_CR11","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights. Cryptology ePrint Archive, Report 2003\/096 (2003), http:\/\/eprint.iacr.org"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/3-540-44750-4_5","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"P. Beguin","year":"1995","unstructured":"Beguin, P., Quisquater, J.J.: Fast server-aided RSA signatures secure against active attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 57\u201369. Springer, Heidelberg (1995)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"P. Nguyen","year":"1998","unstructured":"Nguyen, P., Stern, J.: The Beguin-Quisquater server-aided RSA protocol from Crypto \u201995 is not secure. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 372\u2013379. Springer, Heidelberg (1998)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_28","volume-title":"Public Key Cryptography","author":"M. Jakobsson","year":"2001","unstructured":"Jakobsson, M., Wetzel, S.: Secure Server-Aided Signature Generation. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, Springer, Heidelberg (2001)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (November 1997)","DOI":"10.3233\/JCS-1997-5105"},{"key":"12_CR16","unstructured":"Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: 2002 Network and Distributed Systems Security Symposium (NDSS 2002) (February 2002)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-39881-3_17","volume-title":"Security in Pervasive Computing","author":"K. Bicakci","year":"2004","unstructured":"Bicakci, K., Baykal, N.: SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 187\u2013200. Springer, Heidelberg (2004)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Baykal, N.: Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. In: Proc. of IEEE 8th Symposium on Computers and Communications, ISCC 2003, Antalya, Turkey (2003)","DOI":"10.1109\/ISCC.2003.1214284"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 180\u2013197. Springer, Heidelberg (1997)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)","DOI":"10.1145\/359340.359342"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: Internet public key infrastructure online certificate status protocol. RFC 2560 (June 1999)","DOI":"10.17487\/rfc2560"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:31:22Z","timestamp":1559359882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}