{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:50Z","timestamp":1725566210658},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_24","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"280-291","source":"Crossref","is-referenced-by-count":11,"title":["A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model"],"prefix":"10.1007","author":[{"given":"Zhengyi","family":"Le","sequence":"first","affiliation":[]},{"given":"Yi","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"James","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Fillia","family":"Makedon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Internet X.509 Public Key Infrastructure Certificate and CRL profile. RFC3280 (April 2002)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44448-3_10","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Abdalla","year":"2000","unstructured":"Abdalla, M., Reyzin, L.: A New Forward-Secure Digital Signature Scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 116\u2013129. Springer, Heidelberg (2000)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.K.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 431. Springer, Heidelberg (1999)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36563-X_1","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Yee, B.: Forward-Security in Private-Key Cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 1\u201318. Springer, Heidelberg (2003)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme. In: Advances in Cryptology - Eurocrypt (2002)","DOI":"10.1007\/3-540-39200-9_16"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key- Insulated Public-Key Schemes. In:Workshop on Public Key Cryptography (PKC) (January 2003)","DOI":"10.1007\/3-540-46035-7_5"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Dusart, P.: The kth prime is greater than k(ln k + lnlnk \u2212 1) for k \u2265 2. mc, vol.\u00a068(225), pp. 411\u2013415 (1999)","DOI":"10.1090\/S0025-5718-99-01037-6"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Proceedings of Asiacrypt (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"24_CR9","volume-title":"On Formally Undecidable Propositions of Principia Mathematica and Related Systems","author":"K. G\u00f6del","year":"1992","unstructured":"G\u00f6del, K.: On Formally Undecidable Propositions of Principia Mathematica and Related Systems. Dover Publications, Inc, New York (1992)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-44647-8_20","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"G. Itkis","year":"2001","unstructured":"Itkis, G., Reyzin, L.: Forward-Secure Signatures with Optimal Signing and Verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 332. Springer, Heidelberg (2001)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45708-9_32","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"G. Itkis","year":"2002","unstructured":"Itkis, G., Reyzin, L.: SiBIR: Signer-Base Intrusion-Resilient Signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 499. Springer, Heidelberg (2002)"},{"key":"24_CR12","unstructured":"Katz, J.: A Forward-Secure Public-Key Encryption Scheme. Cryptology eprint archive Report 2002\/060 (May 2002), http:\/\/eprint.iacr.org\/2002\/060\/"},{"key":"24_CR13","unstructured":"Koga, S., Sakurai, K.: Decentralization Methods of Certification Authority Using the Digital Signature Schemes. In: Proceedings of 2nd Annual PKI Research Workshop (2003)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Kozlov, A., Reyzin, L.: Forward-Secure Signatures with Fast Key Update. In: 3rd Conference on Security in Communication Networks (2002)","DOI":"10.1007\/3-540-36413-7_18"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Simple Forward-Secure Signatures From Any Signature Scheme. In:7th ACM Conference on Computer and Communication Security (2000)","DOI":"10.1145\/352600.352617"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Riesel, H.: The Remainder Term in the Prime Number Theorem. Prime Numbers and Computer Methods for Factorization (Progress in Mathematics)\u00a0126 (1994)","DOI":"10.1007\/978-1-4612-0251-6"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:44:56Z","timestamp":1605761096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}