{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:45:58Z","timestamp":1747201558416},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240136"},{"type":"electronic","value":"9783540305019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30501-9_113","type":"book-chapter","created":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T21:42:17Z","timestamp":1294954937000},"page":"591-595","source":"Crossref","is-referenced-by-count":10,"title":["Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings"],"prefix":"10.1007","author":[{"given":"Xiangxue","family":"Li","sequence":"first","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shiqun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"113_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"113_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"key":"113_CR3","unstructured":"Huang, S., Shi, C.: A simple multi-proxy signature scheme. In: Proceedings of the 10th National Conference on Information Security, Taiwan, ROC, pp. 134\u2013138 (2000)"},{"key":"113_CR4","unstructured":"Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, pp. 603\u2013608 (2001)"},{"issue":"9","key":"113_CR5","first-page":"1338","volume":"79","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals\u00a0E79-A(9), 1338\u20131353 (1996)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"6","key":"113_CR6","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1049\/el:20000422","volume":"36","author":"L. Yi","year":"2000","unstructured":"Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters\u00a036(6), 527\u2013528 (2000)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Computing: Applications and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30501-9_113.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:24:54Z","timestamp":1619997894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30501-9_113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240136","9783540305019"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30501-9_113","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}