{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:07Z","timestamp":1725490507170},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_24","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"273-284","source":"Crossref","is-referenced-by-count":1,"title":["A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period"],"prefix":"10.1007","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Shiang-Feng","family":"Tzeng","sequence":"additional","affiliation":[]},{"given":"Chun-Ta","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"24_CR1","first-page":"187","volume":"4","author":"A.K Awasthi","year":"2007","unstructured":"Awasthi, A.K, Lal, S.: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. International Journal of Network Security\u00a04(2), 187\u2013192 (2007)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"24_CR2","first-page":"355","volume":"4","author":"T. Cao","year":"2007","unstructured":"Cao, T., Mao, X.: Original Signer\u2019s Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. International Journal of Network Security\u00a04(3), 355\u2013360 (2007)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"24_CR3","first-page":"312","volume":"4","author":"M.L. Das","year":"2007","unstructured":"Das, M.L., Saxena, A., Phatak, D.B.: Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. International Journal of Network Security\u00a04(3), 312\u2013317 (2007)","journal-title":"International Journal of Network Security"},{"key":"24_CR4","volume-title":"Cryptography and Data Security","author":"E. Dorothy","year":"1982","unstructured":"Dorothy, E., Denning, R.: Cryptography and Data Security. Addison-Wesley, Massachusetts (1982)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0164-1212(01)00032-2","volume":"58","author":"C.-L. Hsu","year":"2001","unstructured":"Hsu, C.-L., Wu, T.-S., Wu, T.-C.: New nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software\u00a058, 119\u2013124 (2001)","journal-title":"The Journal of Systems and Software"},{"issue":"3","key":"24_CR7","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3923\/jas.2001.287.288","volume":"1","author":"M.-S. Hwang","year":"2001","unstructured":"Hwang, M.-S., Lee, C.-C., Lu, E.J.-L.: Cryptanalysis of the batch verifying multiple DSA-type digital signatures. Pakistan Journal of Applied Sciences\u00a01(3), 287\u2013288 (2001)","journal-title":"Pakistan Journal of Applied Sciences"},{"issue":"2","key":"24_CR8","first-page":"1","volume":"11","author":"M.-S. Hwang","year":"2000","unstructured":"Hwang, M.-S., Lin, I.-C., Lu, E.J.-L.: A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica\u00a011(2), 1\u20138 (2000)","journal-title":"International Journal of Informatica"},{"issue":"6","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1109\/TKDE.2003.1245292","volume":"15","author":"M.-S. Hwang","year":"2003","unstructured":"Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engineering\u00a015(6), 1552\u20131560 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"24_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/S0920-5489(03)00075-8","volume":"26","author":"M.-S. Hwang","year":"2004","unstructured":"Hwang, M.-S., Tzeng, S.-F., Tsai, C.-S.: Generalization of proxy signature based on elliptic curves. Computer Standards & Interfaces\u00a026(2), 73\u201384 (2004)","journal-title":"Computer Standards & Interfaces"},{"issue":"3","key":"24_CR11","first-page":"123","volume":"1","author":"M.-S. Hwang","year":"2005","unstructured":"Hwang, M.-S., Chang, T.-Y.: Threshold Signatures: Current Status and Key Issues. International Journal of Network Security\u00a01(3), 123\u2013137 (2005)","journal-title":"International Journal of Network Security"},{"issue":"1","key":"24_CR12","first-page":"43","volume":"2","author":"E.J.-L. Lu","year":"2006","unstructured":"Lu, E.J.-L., Huang, C.-J.: A Time-stamping Proxy Signature Scheme Using Time-stamping Service. International Journal of Network Security\u00a02(1), 43\u201351 (2006)","journal-title":"International Journal of Network Security"},{"issue":"1","key":"24_CR13","first-page":"69","volume":"2","author":"L. Guo","year":"2006","unstructured":"Guo, L., Liu, Y.: Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme. International Journal of Network Security\u00a02(1), 69\u201372 (2006)","journal-title":"International Journal of Network Security"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Information and Communications Security","author":"S. Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 223\u2013232. Springer, Heidelberg (1997)"},{"issue":"2","key":"24_CR15","first-page":"193","volume":"4","author":"J. Li","year":"2007","unstructured":"Li, J., Wang, S.: New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key. International Journal of Network Security\u00a04(2), 193\u2013200 (2007)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0167-4048(03)00312-2","volume":"22","author":"L.-H. Li","year":"2003","unstructured":"Li, L.-H., Tzeng, S.-F., Hwang, M.-S.: Generalization of proxy signature based on discrete logarithms. Computers & Security\u00a022(3), 245\u2013255 (2003)","journal-title":"Computers & Security"},{"issue":"3","key":"24_CR17","first-page":"248","volume":"4","author":"R. Lu","year":"2007","unstructured":"Lu, R., Cao, Z., Shao, J.: On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification. International Journal of Network Security\u00a04(3), 248\u2013253 (2007)","journal-title":"International Journal of Network Security"},{"key":"24_CR18","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign message. IEICE Trans. Fundamentals\u00a0E79-A, 1338\u20131353 (1996)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"8","key":"24_CR19","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/S0140-3664(99)00029-8","volume":"22","author":"H.M. Sun","year":"1999","unstructured":"Sun, H.M.: An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications\u00a022(8), 717\u2013722 (1999)","journal-title":"Computer Communications"},{"issue":"3","key":"24_CR20","doi-asserted-by":"crossref","first-page":"393","DOI":"10.15388\/Informatica.2003.029","volume":"14","author":"C.-S. Tsai","year":"2003","unstructured":"Tsai, C.-S., Tzeng, S.-F., Hwang, M.-S.: Improved non-repudiable threshold proxy signature scheme with known signers. Informatica\u00a014(3), 393\u2013402 (2003)","journal-title":"Informatica"},{"issue":"2","key":"24_CR21","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.cose.2003.12.001","volume":"23","author":"S.-F. Tzeng","year":"2004","unstructured":"Tzeng, S.-F., Hwang, M.-S., Yang, C.-Y.: An improvement of nonrepudiable threshold proxy signature scheme with known signers. Computers & Security\u00a023(2), 174\u2013178 (2004)","journal-title":"Computers & Security"},{"issue":"3","key":"24_CR22","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.jss.2003.09.022","volume":"73","author":"C.-Y. Yang","year":"2004","unstructured":"Yang, C.-Y., Tzeng, S.-F., Hwang, M.-S.: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software\u00a073(3), 507\u2013514 (2004)","journal-title":"The Journal of Systems and Software"},{"issue":"1","key":"24_CR23","first-page":"18","volume":"3","author":"Q. Xie","year":"2006","unstructured":"Xie, Q., Yu, X.-Y.: Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes. International Journal of Network Security\u00a03(1), 18\u201322 (2006)","journal-title":"International Journal of Network Security"},{"key":"24_CR24","unstructured":"Zhang, K.: Threshold proxy signature schemes. In: 1997 Information Security Workshop, pp. 191\u2013197 (1997)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T13:08:29Z","timestamp":1629637709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_24","relation":{},"subject":[]}}