{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:20:20Z","timestamp":1761675620271,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540887324"},{"type":"electronic","value":"9783540887331"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88733-1_9","type":"book-chapter","created":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T22:08:02Z","timestamp":1224194882000},"page":"127-140","source":"Crossref","is-referenced-by-count":5,"title":["Secure Proxy Multi-signature Scheme in the Standard Model"],"prefix":"10.1007","author":[{"given":"Zhenhua","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yupu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"9_CR2","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights, http:\/\/eprint.iacr.org\/2003\/096"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11935070_9","volume-title":"Cryptology and Network Security","author":"F. Cao","year":"2006","unstructured":"Cao, F., Cao, Z.: Security model of proxy-multi signature schemes. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 144\u2013152. Springer, Heidelberg (2006)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/11943952_40","volume-title":"Mobile Ad-hoc and Sensor Networks","author":"X. Huang","year":"2006","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol.\u00a04325, pp. 473\u2013484. Springer, Heidelberg (2006)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1016\/j.amc.2004.03.001","volume":"162","author":"C. Hsu","year":"2005","unstructured":"Hsu, C., Wu, T., He, W.: New proxy multi-signature scheme. Applied Mathematics and Computation\u00a0162, 1201\u20131206 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"2,1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0164-1212(01)00032-2","volume":"58","author":"C. Hsu","year":"2001","unstructured":"Hsu, C., Wu, T., Wu, T.: New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software\u00a058(2,1), 119\u2013124 (2001)","journal-title":"Journal of Systems and Software"},{"issue":"10","key":"9_CR7","first-page":"1429","volume":"27","author":"J. Ji","year":"2004","unstructured":"Ji, J., Li, D., Wang, M.: New proxy multi-signature, multi-proxy signature and multi-proxy multi-signature schemes from bilinear pairings. Chinese Journal of Computers\u00a027(10), 1429\u20131435 (2004)","journal-title":"Chinese Journal of Computers"},{"issue":"4","key":"9_CR8","first-page":"715","volume":"41","author":"J. Ji","year":"2004","unstructured":"Ji, J., Li, D.: A new proxy multi-signature scheme. Journal of Computer Research and Development\u00a041(4), 715\u2013719 (2004)","journal-title":"Journal of Computer Research and Development"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/3-540-36563-X_5","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"J. Lee","year":"2003","unstructured":"Lee, J., Cheon, J., Kim, S.: An analysis of proxy signatures: Is a secure channel necessary? RSA 2003. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 68\u201379. Springer, Heidelberg (2003)"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s10986-005-0008-5","volume":"45","author":"X. Li","year":"2005","unstructured":"Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal\u00a045(1), 76\u201383 (2005)","journal-title":"Lithuanian Mathematical Journal"},{"key":"9_CR11","unstructured":"Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: SCIS 2001, pp. 603\u2013608 (2001)"},{"issue":"9","key":"9_CR12","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science\u00a0E79-A(9), 1338\u20131354 (1996)","journal-title":"IEICE Transactions on Fundamentals of Electronic Communications and Computer Science"},{"key":"9_CR13","first-page":"631","volume-title":"ITCC 2005","author":"T. Okamoto","year":"2005","unstructured":"Okamoto, T., Inomata, A., Okamoto, E.: A proposal of short proxy signature using pairing. In: ITCC 2005, pp. 631\u2013635. IEEE Computer Society, Los Alamitos (2005)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/3-540-47790-X_21","volume-title":"Information Security","author":"T. Okamoto","year":"1999","unstructured":"Okamoto, T., Tada, M., Okamoto, E.: Extended proxy signatures for smart cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol.\u00a01729, pp. 247\u2013258. Springer, Heidelberg (1999)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11780656_18","volume-title":"Information Security and Privacy","author":"K.G. Paterson","year":"2006","unstructured":"Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signature secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 207\u2013222. Springer, Heidelberg (2006)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient Identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-24691-6_23","volume-title":"Information Security and Cryptology - ICISC 2003","author":"G. Wang","year":"2004","unstructured":"Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security analysis of some proxy signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 305\u2013319. Springer, Heidelberg (2004)"},{"issue":"9","key":"9_CR18","first-page":"1928","volume":"29","author":"Q. Wang","year":"2006","unstructured":"Wang, Q., Cao, Z.: Formal model of proxy multi-signature and a construction. Chinese Journal of Computer\u00a029(9), 1928\u20131935 (2006)","journal-title":"Chinese Journal of Computer"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-540-40061-5_32","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"H. Wang","year":"2003","unstructured":"Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 507\u2013522. Springer, Heidelberg (2003)"},{"issue":"6","key":"9_CR20","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1049\/el:20000422","volume":"36","author":"L. Yi","year":"2000","unstructured":"Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters\u00a036(6), 527\u2013528 (2000)","journal-title":"Electronics Letters"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 218\u2013219. Springer, Heidelberg (2003)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, F., Safavi-Naini, R., Lin, C.: New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings, http:\/\/eprint.iacr.org\/2003\/104","DOI":"10.1007\/3-540-45067-X_27"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88733-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T14:44:51Z","timestamp":1557845091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88733-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540887324","9783540887331"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88733-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}