{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:17Z","timestamp":1725558677010},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_32","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"374-385","source":"Crossref","is-referenced-by-count":2,"title":["On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes"],"prefix":"10.1007","author":[{"given":"Zuowen","family":"Tan","sequence":"first","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mingsheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights, IACR ePrint Archive (2003), available at \n                    \n                      http:\/\/eprint.iacr.org\/2003\/096"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"32_CR3","first-page":"427","volume-title":"Proc. 28th FOCS","author":"P. Feldman","year":"1987","unstructured":"Feldman, P.: A Practical Scheme for Non\u2013Interactive Verifiable Secret Sharing. In: Proc. 28th FOCS, pp. 427\u2013437. IEEE, Los Alamitos (1987)"},{"issue":"2001","key":"32_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0164-1212(01)00032-2","volume":"58","author":"C.-L. Hsu","year":"2001","unstructured":"Hsu, C.-L., Wu, T.-S., Wu, T.-C.: New nonrepudiable threshold proxy signature schemem with known signers. The Journal of Systems and Software\u00a058(2001), 119\u2013124 (2001)","journal-title":"The Journal of Systems and Software"},{"issue":"2","key":"32_CR5","first-page":"1","volume":"11","author":"M.-S. Hwang","year":"2000","unstructured":"Hwang, M.-S., Lin, I.-C., Lu, K.-F.: A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica\u00a011(2), 1\u20138 (2000)","journal-title":"International Journal of Informatica"},{"issue":"16","key":"32_CR6","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1109\/TKDE.2003.1245292","volume":"15","author":"M.-S. Hwang","year":"2003","unstructured":"Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A practical (t,n) threshold proxy signature scheme bBased on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng.\u00a015(16), 1552\u20131560 (2003)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Information and Communications Security","author":"S.J. Kim","year":"1997","unstructured":"Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 223\u2013232. Springer, Heidelberg (1997)"},{"key":"32_CR8","unstructured":"Lee, B., Kim, H., Kim, K.: Strong proxy signgture and its applications. In: Proceedings of SCIS 2001, pp. 603\u2013608 (2001)"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/238168.238185","volume-title":"Proc. 3rd ACM Conference on Computer and Communications Security","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 48\u201357. ACM Press, New York (1996)"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-24676-3_19","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"T. Malkin","year":"2004","unstructured":"Malkin, T., Obana, S., Yung, M.: The hierarchy of key evovlving signatures and a characterization proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 306\u2013322. Springer, Heidelberg (2004)"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/3-540-45600-7_49","volume-title":"Information and Communications Security","author":"H.-U. Park","year":"2001","unstructured":"Park, H.-U., Lee, L.-Y.: A digital nominative proxy signature scheme for mobile communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 451\u2013455. Springer, Heidelberg (2001)"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: Distributed Provers with Applications to Undeniable Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 221\u2013242. Springer, Heidelberg (1991)"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 522\u2013526. Springer, Heidelberg (1991)"},{"issue":"11","key":"32_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"issue":"8","key":"32_CR16","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/S0140-3664(99)00029-8","volume":"22","author":"H.M. Sun","year":"1999","unstructured":"Sun, H.M.: An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications\u00a022(8), 717\u2013722 (1999)","journal-title":"Computer Communications"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.cose.2003.12.001","volume":"23","author":"S.-F. Tzeng","year":"2004","unstructured":"Tzeng, S.-F., Hwang, M.-S., Yang, C.-Y.: An improvement of nonrepudiable threshold proxy signature schemem with known signers. Computers & Security\u00a023, 174\u2013178 (2004)","journal-title":"Computers & Security"},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.future.2004.01.002","volume":"20","author":"S.-F. Tzeng","year":"2004","unstructured":"Tzeng, S.-F., Yang, C.-Y., Hwang, M.-S.: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Computer Systems\u00a020, 887\u2013893 (2004)","journal-title":"Future Generation Computer Systems"},{"issue":"10","key":"32_CR19","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/TKDE.2004.52","volume":"16","author":"G.-L. Wang","year":"2004","unstructured":"Wang, G.-L., Bao, F., Zhou, J.-Y., Deng, R.H.: Comments on A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng.\u00a016(10), 1309\u20131311 (2004)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"32_CR20","unstructured":"Yang, F.-Y., Jan, J.-K., Jeng, W.-J.: Cryptanalysis of a threshold proxy signature with known signers, IACR ePrint Archive (2004), available at \n                    \n                      http:\/\/eprint.iacr.org\/2004\/313"},{"issue":"9","key":"32_CR21","first-page":"1","volume":"22","author":"C.-Y. Yang","year":"2003","unstructured":"Yang, C.-Y., Tzeng, S.-F., Hwang, M.-S.: On the efficiency of nonrepudiable threshold proxy signatures with known signers. The Journal of Systems and Software\u00a022(9), 1\u20138 (2003)","journal-title":"The Journal of Systems and Software"},{"key":"32_CR22","unstructured":"Zhang, K.: Threshold proxy signature schemes. In: Information Security Workshop, Japan, pp. 191\u2013197 (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:30Z","timestamp":1620013470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}