{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:07:09Z","timestamp":1725491229714},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_58","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T05:38:34Z","timestamp":1189575514000},"page":"556-566","source":"Crossref","is-referenced-by-count":3,"title":["Linkability Analysis of Some Blind Signature Schemes"],"prefix":"10.1007","author":[{"given":"Jian","family":"Mao","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/11599371_11","volume-title":"Cryptology and Network Security","author":"Z.J. Huang","year":"2005","unstructured":"Huang, Z.J., Chen, K.F., Wang, Y.M: Efficient Identity-Based Signatures and Blind Signatures. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 120\u2013133. Springer, Heidelberg (2005)"},{"key":"58_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1984","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1984)"},{"key":"58_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"58_CR4","series-title":"Lecture Notes in Computer Sciencs","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology: Proceedings of CRYPTO","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signature for untraceable payment. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology: Proceedings of CRYPTO. Lecture Notes in Computer Sciencs, vol.\u00a01983, pp. 199\u2013203. Springer, Heidelberg (1983)"},{"key":"58_CR5","series-title":"Lecture Notes in Computer Sciencs","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/11506157_27","volume-title":"Australasian Conference on Information Security and Privacy \u2013 ACISP\u201905","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M., Hui, L.C.K., Yie, S.M., Chow, K.P.: Two Improved Partially Blind Signature scheme from Bilinear Pairings. In: Colin, B., Nieto, G., Manuel, J. (eds.) ACISP 2005. Lecture Notes in Computer Sciencs, vol.\u00a03574, pp. 316\u2013328. Springer, Heidelberg (2005)"},{"key":"58_CR6","series-title":"Lecture Notes in Computer Sciencs","first-page":"318","volume-title":"Information and Communications Security","author":"J. Kim","year":"2001","unstructured":"Kim, J., Kim, K., Lee, C.: An Efficient and Provably Secure Threshold Blind Signature. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICISC 2001. Lecture Notes in Computer Sciencs, vol.\u00a02288, pp. 318\u2013327. Springer, Heidelberg (2001)"},{"key":"58_CR7","series-title":"Lecture Notes in Computer Sciencs","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pderson","year":"1991","unstructured":"Pderson, T.P.: Distributed Provers with Applications to Undeniable Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. Lecture Notes in Computer Sciencs, vol.\u00a0547, pp. 221\u2013242. Springer, Heidelberg (1991)"},{"key":"58_CR8","series-title":"Lecture Notes in Computer Science","first-page":"31","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2001","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman group signature. In: Desmedt, Y. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 31\u201346. Springer, Heidelberg (2001)"},{"key":"58_CR9","series-title":"Lecture Notes in Computer Science","first-page":"221","volume-title":"Information and Communications Security","author":"S. Wang","year":"2005","unstructured":"Wang, S., Bao, F., Deng, R.H.: Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 221\u2013242. Springer, Heidelberg (2005)"},{"key":"58_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-30598-9_10","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., Koprowski, M., Warinschi, B.: Efficient Blind Signatures Without Random Oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 134\u2013146. Springer, Heidelberg (2005)"},{"key":"58_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48658-5_23","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C. Dwork","year":"1994","unstructured":"Dwork, C., Naor, M.: An efficient existentially unforgeable signature scheme and its applications. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 234\u2013246. Springer, Heidelberg (1994)"},{"key":"58_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S. Even","year":"1996","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/off-line digital signatures. Journal of Cryptology\u00a09, 35\u201367 (1996)","journal-title":"Journal of Cryptology"},{"key":"58_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/501983.501988","volume-title":"The 8th ACM Conference on Computer and Communication security","author":"A. Perrig","year":"2001","unstructured":"Perrig, A.: The BiBa one-time signature and broadcast authentication. In: The 8th ACM Conference on Computer and Communication security, pp. 28\u201337. ACM, New York (2001)"},{"key":"58_CR14","series-title":"Lecture Notes in Computer Science","first-page":"533","volume-title":"Networking and Mobile Computing","author":"J. Zhang","year":"2005","unstructured":"Zhang, J., Zou, J., Wang, Y.: A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol.\u00a03619, pp. 533\u2013547. Springer, Heidelberg (2005)"},{"key":"58_CR15","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology\u00a013, 361\u2013396 (1996)","journal-title":"Journal of Cryptology"},{"key":"58_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-36178-2_33","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"F. Zhang","year":"2002","unstructured":"Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) EurAsia-ICT 2002. LNCS, vol.\u00a02510, pp. 533\u2013547. Springer, Heidelberg (2002)"},{"key":"58_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based Blind Signature and Proxy signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 312\u2013323. Springer, Heidelberg (2003)"},{"key":"58_CR18","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information and Communications Security","author":"C. Schnorr","year":"2002","unstructured":"Schnorr, C.: Security of Blind discrete log signature against interactive attacks. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ARCS 2002. LNCS, vol.\u00a02299, pp. 1\u201312. Springer, Heidelberg (2002)"},{"issue":"2","key":"58_CR19","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"Y.. Xun","year":"2003","unstructured":"Xun, Y.: An Identity-Based Signature Scheme From the Weil Pairing. IEEE Communications Letter\u00a07(2), 76\u201378 (2003)","journal-title":"IEEE Communications Letter"},{"key":"58_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/11751595_38","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"Q. Wu","year":"2006","unstructured":"Wu, Q., Susilo, W., Mu, Y., Zhang, F.: Efficient Partially Blind Signatures with Provable Security. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e0, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 345\u2013354. Springer, Heidelberg (2006)"},{"key":"58_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/BFb0034851","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Abe","year":"1996","unstructured":"Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 244\u2013252. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:21:40Z","timestamp":1619518900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}