{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:20:59Z","timestamp":1725538859950},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642052835"},{"type":"electronic","value":"9783642052842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05284-2_19","type":"book-chapter","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T12:06:00Z","timestamp":1255435560000},"page":"330-339","source":"Crossref","is-referenced-by-count":0,"title":["Breaking and Building of Group Inside Signature"],"prefix":"10.1007","author":[{"given":"S. Sree","family":"Vivek","sequence":"first","affiliation":[]},{"given":"S. Sharmila Deva","family":"Selvi","sequence":"additional","affiliation":[]},{"given":"S. Gopi","family":"Nath","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"issue":"3","key":"19_CR2","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput.\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11780656_20","volume-title":"Information Security and Privacy","author":"B.C. Hu","year":"2006","unstructured":"Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 235\u2013246. Springer, Heidelberg (2006)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 143\u2013154. Springer, Heidelberg (1996)"},{"key":"19_CR5","unstructured":"Ma, C., Ao, F., He, D.: Certificateless group inside signature. In: Proceedings, April 2005, pp. 194\u2013200 (2005)"},{"key":"19_CR6","unstructured":"Ma, C., Ao, J.: Certificateless group oriented signature secure against key replacement attack. Cryptology ePrint Archive, Report 2009\/139 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"19_CR7","unstructured":"Ma, C., He, D., Ao, J.: Broadcast group oriented signature. In: 2005 Fifth International Conference on Information, Communications and Signal Processing, pp. 454\u2013458 (2005)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/11816157_128","volume-title":"Intelligent Computing","author":"C. Ma","year":"2006","unstructured":"Ma, C., Li, J.: Adaptable designated group signature. In: Huang, D.-S., Li, K., Irwin, G.W. (eds.) ICIC 2006. LNCS, vol.\u00a04113, pp. 1053\u20131061. Springer, Heidelberg (2006)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"19_CR10","unstructured":"Sree Vivek, S., Sharmila Deva Selvi, S., Gopinath, S., Pandu Rangan, C.: Breaking and building of group inside signature. Cryptology ePrint Archive, Report 2009\/188 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05284-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T06:17:50Z","timestamp":1552198670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05284-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642052835","9783642052842"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05284-2_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}