{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:30:51Z","timestamp":1762781451714},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540756699"},{"type":"electronic","value":"9783540756705"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75670-5_15","type":"book-chapter","created":{"date-parts":[[2007,10,5]],"date-time":"2007-10-05T03:13:20Z","timestamp":1191554000000},"page":"208-217","source":"Crossref","is-referenced-by-count":22,"title":["Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature"],"prefix":"10.1007","author":[{"given":"Jin","family":"Li","sequence":"first","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights. Cryptology ePrint Archive, Report 2003\/096 (2003), available at \n                    \n                      http:\/\/eprint.iacr.org"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Shacham, H., Lynn, B.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C., Ramzan, Z.: Identity-Based Aggregate Signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 257\u2013273. Springer, Heidelberg (2006)"},{"key":"15_CR5","first-page":"480","volume-title":"EUC Workshops","author":"X. Huang","year":"2005","unstructured":"Huang, X., Mu, Y., Susilo, W., Zhang, F., Chen, X.: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. In: EUC Workshops, pp. 480\u2013489. Springer, Heidelberg (2005)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","first-page":"99","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"B.G. Kang","year":"2004","unstructured":"Kang, B.G., Park, J.H., Hahn, S.G.: A Certificate-Based Signature Scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 99\u2013111. Springer, Heidelberg (2004)"},{"issue":"4","key":"15_CR7","first-page":"721","volume":"15","author":"J. Li","year":"2006","unstructured":"Li, J., Wang, Y.: A short provably secure proxy signature scheme. Chinese Journal of Electronics\u00a015(4), 721\u2013724 (2006)","journal-title":"Chinese Journal of Electronics"},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/238168.238185","volume-title":"CCS","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: CCS. Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48\u201357. ACM Press, New York (1996)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-24676-3_19","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"S. Malkin","year":"2004","unstructured":"Malkin, S., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 306\u2013322. Springer, Heidelberg (2004)"},{"key":"15_CR10","unstructured":"Neuman, B.C.: Proxy based authorization and accounting for distributed systems. In: Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 283\u2013291 (1993)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-540-24691-6_23","volume-title":"Information Security and Cryptology - ICISC 2003","author":"G. Wang","year":"2004","unstructured":"Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 305\u2013319. Springer, Heidelberg (2004)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-540-40061-5_32","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"H.X. Wang","year":"2003","unstructured":"Wang, H.X., Pieprzyk, J.: Efficient One-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 507\u2013522. Springer, Heidelberg (2003)"},{"key":"15_CR13","unstructured":"Zhu, H., Bao, F., Li, T., Wu, Y.: Sequential aggregate signatures for wireless routing protocols. In: IEEE WCNC 2005, pp. 2436\u20132439 (2005)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75670-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:36:05Z","timestamp":1558262165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75670-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540756699","9783540756705"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75670-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}