{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:23Z","timestamp":1725533603275},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_60","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T10:22:04Z","timestamp":1245234124000},"page":"588-597","source":"Crossref","is-referenced-by-count":6,"title":["An Improved Secure Identity-Based On-Line\/Off-Line Signature Scheme"],"prefix":"10.1007","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Shengnan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Geng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"S. Even","year":"1990","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 263\u2013275. Springer, Heidelberg (1990)"},{"key":"60_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-44647-8_21","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"A. Shamir","year":"2001","unstructured":"Shamir, A., Tauman, Y.: Improved online\/offline signatuer schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 355\u2013367. Springer, Heidelberg (2001)"},{"key":"60_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-79263-5_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"P. Yu","year":"2008","unstructured":"Yu, P., Tate, S.R.: Online\/offline signature schemes for devices with limited computing capabilities. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 301\u2013317. Springer, Heidelberg (2008)"},{"key":"60_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/11780656_9","volume-title":"Information Security and Privacy","author":"S. Xu","year":"2006","unstructured":"Xu, S., Mu, Y., Susilo, W.: Online\/offline signatures and multisignatures for AODV and DSR routing security. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 99\u2013110. Springer, Heidelberg (2006)"},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/11745853_22","volume-title":"Public Key Cryptography - PKC 2006","author":"K. Kurosawa","year":"2006","unstructured":"Kurosawa, K., Schmidt-Samoa, K.: New online\/offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 330\u2013346. Springer, Heidelberg (2006)"},{"key":"60_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-78440-1_7","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"D. Catalano","year":"2008","unstructured":"Catalano, D., Di Raimondo, M., Fiore, D., Gennaro, R.: Off-line\/on-line signatures; theoretical aspects and experimental results. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 101\u2013120. Springer, Heidelberg (2008)"},{"key":"60_CR7","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. IETF Internet Draft, Manet working group, Draft-ietf-manetaodv- 13.txt"},{"key":"#cr-split#-60_CR8.1","doi-asserted-by":"crossref","unstructured":"Xu, S., Mu, Y., Susilo, W.: On the Security of Online\/Offline Signatures and Multisignatures from ACISP 2006. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.??4058, pp. 99???110. Springer, Heidelberg (2006);","DOI":"10.1007\/11780656_9"},{"key":"#cr-split#-60_CR8.2","unstructured":"M.K. Franklin, L.C.K. Hui, and D.S. Wong (eds.) CANS 2008. LNCS, vol. 5339, pp. 64???79. Springer, Heidelberg (2008)"},{"key":"60_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"key":"60_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, I.: Security proof for signature scheme. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"60_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/11935230_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"D. Galindo","year":"2006","unstructured":"Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 178\u2013193. Springer, Heidelberg (2006)"},{"issue":"3","key":"60_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.adhoc.2004.03.005","volume":"2","author":"H. Deng","year":"2004","unstructured":"Deng, H., Agrawal, D.P.: TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks\u00a02(3), 291\u2013307 (2004)","journal-title":"Ad Hoc Networks"},{"key":"60_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-78440-1_7","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"D. Catalano","year":"2008","unstructured":"Catalano, D., Di Raimondo, M., Fiore, D., Gennaro, R.: Off-line\/on-line signatures; theoretical aspects and experimental results. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 101\u2013120. Springer, Heidelberg (2008)"},{"key":"60_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"60_CR15","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of Symposium on cryptography and Information Security, SCIS 2000, pp. 459\u2013466 (2000)"},{"key":"60_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/BFb0053433","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"L. Chen","year":"1995","unstructured":"Chen, L., Pedersen, T.P.: New group signature schemes. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 171\u2013181. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:35:56Z","timestamp":1558380956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}