{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:06:43Z","timestamp":1725574003527},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408086"},{"type":"electronic","value":"9783540452294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45229-4_10","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T00:58:04Z","timestamp":1294361884000},"page":"94-103","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Signature Validation Based on a New PKI"],"prefix":"10.1007","author":[{"given":"Jianying","family":"Zhou","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BFb0055725","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"W. Aiello","year":"1998","unstructured":"Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 137\u2013152. Springer, Heidelberg (1998)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44448-3_10","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Abdalla","year":"2000","unstructured":"Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 116\u2013129. Springer, Heidelberg (2000)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 431\u2013438. Springer, Heidelberg (1999)"},{"issue":"11","key":"10_CR4","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1145\/358790.358798","volume":"24","author":"K.S. Booth","year":"1981","unstructured":"Booth, K.S.: Authentication of signatures using public key encryption. Communications of the ACM\u00a024(11), 772\u2013774 (1981)","journal-title":"Communications of the ACM"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cooper, D.: A more efficient use of delta-CRLs. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, Oakland, California, pp. 190\u2013202 (May 2000)","DOI":"10.1109\/SECPRI.2000.848456"},{"key":"10_CR6","unstructured":"ISO\/IEC 13888-1. Information technology - Security techniques -Non-repudiation - Part 1: General. ISO\/IEC (1997)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-44647-8_20","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"G. Itkis","year":"2001","unstructured":"Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 332\u2013354. Springer, Heidelberg (2001)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45708-9_32","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"G. Itkis","year":"2002","unstructured":"Itkis, G., Reyzin, L.: SiBIR: Signer-base intrusion-resilient signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 499\u2013514. Springer, Heidelberg (2002)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"Financial Cryptography","author":"P. Kocher","year":"1998","unstructured":"Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 172\u2013177. Springer, Heidelberg (1998)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: Proceedings of 7th ACM Conference on Computer and Communications Security, Athens, Greece, pp. 108\u2013115 (November 2000)","DOI":"10.1145\/352600.352617"},{"issue":"11","key":"10_CR11","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"10_CR12","unstructured":"Micali, S.: Certificate revocation system. US Patent 6292893 (September 2001)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"McDaniel, P., Jamin, S.: Windowed certificate revocation. In: Proceedings of IEEE INFOCOM 2000, Tel-Aviv, Israel, pp. 1406\u20131414 (March 2000)","DOI":"10.1109\/INFCOM.2000.832538"},{"key":"10_CR14","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings 7th USENIX Security Symposium, San Antonio, Texas (January 1998)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 public key infrastructure certificate and CRL profile. RFC 2459 (January 1999)","DOI":"10.17487\/rfc2459"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X. 509 Internet public key infrastructure on-line certificate status protocol (OCSP). RFC 2560 (June 1999)","DOI":"10.17487\/rfc2560"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Admas, C., Cain, P., Pinkas, D., Zuccherato, R.: Internet X. 509 public key infrastructure time-stamp protocol (TSP). RFC 3161 (August 2001)","DOI":"10.17487\/rfc3161"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wright, R., Lincoln, P., Millen, J.: Efficient fault-tolerant certificate revocation. In: Proceedings of 7th ACM Conference on Computer and Communications Security, Athens, Greece, pp. 19\u201324 (November 2000)","DOI":"10.1145\/352600.352605"},{"key":"10_CR19","unstructured":"Zhou, J.: Non-repudiation in electronic commerce. Computer Security Series. Artech House (2001)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-45450-0_24","volume-title":"Information Security and Privacy","author":"J. Zhou","year":"2002","unstructured":"Zhou, J.: Maintaining the validity of digital signatures in B2B applications. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 303\u2013315. Springer, Heidelberg (2002)"},{"key":"10_CR21","unstructured":"Zhou, J., Bao, F., Deng, R.: NewPKI. Internal document (2002)"},{"issue":"8","key":"10_CR22","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/S0140-3664(99)00031-6","volume":"22","author":"J. Zhou","year":"1999","unstructured":"Zhou, J., Lam, K.Y.: Securing digital signatures for nonrepudiation. Computer Communications\u00a022(8), 710\u2013716 (1999)","journal-title":"Computer Communications"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45229-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:11:32Z","timestamp":1559913092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45229-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408086","9783540452294"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45229-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}