{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:00:12Z","timestamp":1725534012838},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024689"},{"type":"electronic","value":"9783642024696"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02469-6_48","type":"book-chapter","created":{"date-parts":[[2009,6,27]],"date-time":"2009-06-27T05:11:03Z","timestamp":1246079463000},"page":"1701-1718","source":"Crossref","is-referenced-by-count":0,"title":["Further Study on Proxy Authorization and Its Scheme"],"prefix":"10.1007","author":[{"given":"Xuanwu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-36159-6_7","volume-title":"Information and Communications Security","author":"T. Nakanishi","year":"2002","unstructured":"Nakanishi, T., Tao, M.: A Group Signature Scheme Committing the Group. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 73\u201384. Springer, Heidelberg (2002)"},{"key":"48_CR2","volume-title":"Research on Digital Signature with Additional Properties","author":"Z. Huang","year":"2005","unstructured":"Huang, Z.: Research on Digital Signature with Additional Properties. Xidian University, Xi\u2019an (2005)"},{"key":"48_CR3","first-page":"473","volume-title":"Proceeding of the Sixth International Conference on Grid and Cooperative Computing GCC 2007","author":"X. Zhou","year":"2007","unstructured":"Zhou, X.: Dynamic Group Signature with Forward Security and Its Application. In: Proceeding of the Sixth International Conference on Grid and Cooperative Computing GCC 2007, pp. 473\u2013480. IEEE Press, Piscataway (2007)"},{"key":"48_CR4","first-page":"148","volume-title":"International Association for Cryptology Research 2004","author":"R.M. Avanzi","year":"2004","unstructured":"Avanzi, R.M.: Aspects of Hyper-elliptic Curves over Large Prime Fields in Software Implementations. In: International Association for Cryptology Research 2004, pp. 148\u2013162. Springer, Heidelberg (2004)"},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/11596981_61","volume-title":"Computational Intelligence and Security","author":"L. Hui-Xian","year":"2005","unstructured":"Hui-Xian, L., Chun-tian, C.: A New (t, n)-threshold Multi-secret Sharing Scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol.\u00a03802, pp. 421\u2013426. Springer, Heidelberg (2005)"},{"key":"48_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/3-540-45600-7_49","volume-title":"Information and Communications Security","author":"H.-U. Park","year":"2001","unstructured":"Park, H.-U., Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 451\u2013455. Springer, Heidelberg (2001)"},{"key":"48_CR7","unstructured":"Zdzislaws, H., Knap, M.M.: Research on Pre-processing and Post-processing of Data in the Process of Creation Quasi-optimal Decision Trees. Intelligence Methods\u00a0(11), 13\u201315 (2002)"},{"issue":"6","key":"48_CR8","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.future.2003.09.005","volume":"20","author":"C. Ting-Yi","year":"2004","unstructured":"Ting-Yi, C., Chou-Chen, Y., Min-Shiang, H.: A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems\u00a020(6), 1013\u20131021 (2004)","journal-title":"Future Generation Computer Systems"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-36178-2_26","volume-title":"Advances in Cryptology-ASIACRYPT 2002","author":"M. Abe","year":"2002","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1 out of n Signature from a Variety of Keys. In: Advances in Cryptology-ASIACRYPT 2002, pp. 415\u2013423. Springer, Heidelberg (2002)"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/ICNSC.2004.1297083","volume-title":"IEEE International Conference on Networking, Sensing and Control, 2004","author":"H. Hwa-Ching","year":"2004","unstructured":"Hwa-Ching, H., Tung-Shou, C., Yu-Hsuen, L.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to bide the secret sharing. In: IEEE International Conference on Networking, Sensing and Control, 2004, vol.\u00a0(2), pp. 996\u20131001. IEEE Press, Piscataway (2004)"},{"issue":"1","key":"48_CR11","first-page":"322","volume":"88","author":"K. Tochikubo","year":"2005","unstructured":"Tochikubo, K., Uyematsu, T., Matsumoto, R.: Efficient Secret Sharing Schemes Based on Authorized Subsets. IEICE Transactions Special Section on Cryptography and Information Security\u00a0E88-A(1), 322\u2013326 (2005)","journal-title":"IEICE Transactions Special Section on Cryptography and Information Security"},{"issue":"5","key":"48_CR12","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1109\/TKDE.2003.1245292","volume":"15","author":"M.S. Hwang","year":"2003","unstructured":"Hwang, M.S., Lin, E.J., Lin, I.C.: A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engering\u00a015(5), 1552\u20131560 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engering"},{"key":"48_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Denitions, Simpli\u00afed Requirements, and a Construction based on General Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"key":"48_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-24676-3_19","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"T. Malkin","year":"2004","unstructured":"Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 306\u2013322. Springer, Heidelberg (2004)"},{"key":"48_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-47942-0_26","volume-title":"Information and Communication Security","author":"K. Kobara","year":"1999","unstructured":"Kobara, K., Imai, H.: On the channel capacityof narrow-band subliminal channels. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol.\u00a01726, pp. 309\u2013323. Springer, Heidelberg (1999)"},{"key":"48_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/3-540-45600-7_49","volume-title":"Information and Communications Security","author":"H.U. Park","year":"2001","unstructured":"Park, H.U., Lee, I.Y.: A Digital Nominative Proxy Signature Scheme for Mobile Communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 451\u2013455. Springer, Heidelberg (2001)"},{"issue":"6","key":"48_CR17","first-page":"1645","volume":"87","author":"T.-Y. Chang","year":"2004","unstructured":"Chang, T.-Y., Yang, C.-C., Hwang, M.-S.: Cryptanalysis of publicly veriableauthenticated encryption. IEICE Transactions on Fundamental\u00a0E87-A(6), 1645\u20131646 (2004)","journal-title":"IEICE Transactions on Fundamental"},{"key":"48_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F..G. Zhang","year":"2004","unstructured":"Zhang, F.G., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 277\u2013290. Springer, Heidelberg (2004)"},{"key":"48_CR19","unstructured":"Fan, H., Feng, D.: Theory and Method of Secure Protocols. Science Press (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Complex Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02469-6_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T19:39:27Z","timestamp":1552073967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02469-6_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024689","9783642024696"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02469-6_48","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}