{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:33:07Z","timestamp":1760707987895,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540887324"},{"type":"electronic","value":"9783540887331"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88733-1_10","type":"book-chapter","created":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T22:08:02Z","timestamp":1224194882000},"page":"141-155","source":"Crossref","is-referenced-by-count":20,"title":["Server-Aided Verification Signatures: Definitions and New Constructions"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1049\/el:19920937","volume":"28","author":"R.J. Anderson","year":"1992","unstructured":"Anderson, R.J.: An Attack on Server-Assisted Authentication Protocols. Electronic Letters\u00a028(15), 1473 (1992)","journal-title":"Electronic Letters"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-540-24676-3_23","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short Signatures without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 382\u2013400. Springer, Heidelberg (2004)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, G., Shacham, H.: Short Signature from The Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"10_CR4","first-page":"147","volume":"43","author":"J. Burns","year":"1994","unstructured":"Burns, J., Mitchell, C.J.: Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Transaction on Computers\u00a043, 147\u2013163 (1994)","journal-title":"IEEE Transaction on Computers"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/3-540-44750-4_5","volume-title":"Advances in Cryptology - CRYPTO 1995","author":"P. Beguin","year":"1995","unstructured":"Beguin, P., Quisquater, J.-J.: Fast Server-Aided RSA Signatures Secure Against Active Attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 57\u201369. Springer, Heidelberg (1995)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO 1998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/11593447_33","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"M. Girault","year":"2005","unstructured":"Girault, M., Lefranc, D.: Server-Aided Verification: Theory and Practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 605\u2013623. Springer, Heidelberg (2005)"},{"key":"10_CR8","unstructured":"Girault, M., Quisquater, J.J.: GQ + GPS = new ideas + new protocols. In: Eurocrypt 2002 - Rump Session (2002)"},{"key":"10_CR9","unstructured":"Girault, M., Paill\u00e8s, J.C.: On-line\/Off-line RSA-like. In: International Workshop on Coding and Cryptography\u00a0 (2003)"},{"issue":"4","key":"10_CR10","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s001450010001","volume":"13","author":"R. Gennaro","year":"2000","unstructured":"Gennaro, R., Rabin, T., Krawczyk, H.: RSA-Based Undeniable Signatrues. Journal of Cryptology\u00a013(4), 397\u2013416 (2000)","journal-title":"Journal of Cryptology"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J.\u00a0Comput.\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM J.\u00a0Comput."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kawamura, S., Shimbo, A.: Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. IEEE Journal on selected areas communications\u00a011 (1993)","DOI":"10.1109\/49.223880"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/3-540-44750-4_6","volume-title":"Advances in Cryptology - CRYPTO 1995","author":"C.H. Lim","year":"1995","unstructured":"Lim, C.H., Lee, P.J.: Security and Performance of Server-Aided RSA Computation Protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 70\u201383. Springer, Heidelberg (1995)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-57220-1_70","volume-title":"Advances in Cryptology - AUSCRYPT 1992","author":"T. Matsumoto","year":"1993","unstructured":"Matsumoto, T., Imai, H., Laih, C.-S., Yen, S.-M.: On Verifiable Implicit Asking Protocols for RSA Computation. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 296\u2013307. Springer, Heidelberg (1993)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/0-387-34799-2_35","volume-title":"Advances in Cryptology - CRYPTO 1988","author":"T. Matsumoto","year":"1990","unstructured":"Matsumoto, T., Kato, K., Imai, H.: Speeding Up Secret Computation with Insecure Auxiliary Devices. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 497\u2013506. Springer, Heidelberg (1990)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","volume-title":"Advances in Cryptology - ASIACRYPT1998","author":"P. Nguyen","year":"1998","unstructured":"Nguyen, P., Stern, J.: The B\u00e9guin-Quisquater Server-Aided RSA Protocol from Crypto95 is not Secure. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 372\u2013379. Springer, Heidelberg (1998)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-47555-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 1992","author":"B. Pfitamann","year":"1993","unstructured":"Pfitamann, B., Waidner, M.: Attacks on Protocols for Sever-Aided RSA Computation. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 153\u2013162. Springer, Heidelberg (1993)"},{"key":"10_CR18","unstructured":"Quisquater, J.-J., De Soete, M.: Speeding Up Smart Card RSA Computation with Insecure Coprosessors. In: Proceedings of Smart Cards 2000 , pp. 191\u2013197 (1989)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Yen, S.-M., Laih, C.-S.: More about the Active Attack on the Server-Aided Secret Computation Protocol. Electronic Letters, 2250 (1992)","DOI":"10.1049\/el:19921446"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F. Zhang","year":"2004","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairing and its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 277\u2013290. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88733-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T14:17:17Z","timestamp":1551622637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88733-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540887324","9783540887331"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88733-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}