{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:34:14Z","timestamp":1725543254791},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106217"},{"type":"electronic","value":"9783642106224"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10622-4_12","type":"book-chapter","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T21:36:26Z","timestamp":1263332186000},"page":"147-157","source":"Crossref","is-referenced-by-count":1,"title":["A Special Proxy Signature Scheme with Multi-warrant"],"prefix":"10.1007","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shengnan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"12_CR1","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamot, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals\u00a0E79-A(9), 1338\u20131353 (1996)","journal-title":"IEICE Trans. Fundamentals"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/11576259_40","volume-title":"ISPA Workshops","author":"J. Xu","year":"2005","unstructured":"Xu, J., Zhang, Z., Feng, D.: ID-Based Proxy Signature Using Bilinear Pairings. In: COLT 2005. LNCS, vol.\u00a03559, pp. 359\u2013367. Springer, Heidelberg (2005)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 312\u2013323. Springer, Heidelberg (2003)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F. Zhang","year":"2004","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its application. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 277\u2013290. Springer, Heidelberg (2004)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/11935308_5","volume-title":"Information and Communications Security","author":"K.-A. Shim","year":"2006","unstructured":"Shim, K.-A.: An Identity-based Proxy Signature Scheme from Pairings. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 60\u201371. Springer, Heidelberg (2006)"},{"key":"12_CR6","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, http:\/\/eprint.iacr.org\/2003\/096"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/11943952_40","volume-title":"Mobile Ad-hoc and Sensor Networks","author":"X. Huang","year":"2006","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy Signature without Random Oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol.\u00a04325, pp. 473\u2013484. Springer, Heidelberg (2006)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-73547-2_5","volume-title":"Autonomic and Trusted Computing","author":"W. Wu","year":"2007","unstructured":"Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based Proxy Signature from Pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol.\u00a04610, pp. 22\u201331. Springer, Heidelberg (2007)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptively chosen message attacks. SIAM Journal on Computing\u00a017(2), 281\u2013308","DOI":"10.1137\/0217017"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/3-540-45600-7_49","volume-title":"Information and Communications Security","author":"H.-U. Park","year":"2001","unstructured":"Park, H.-U., Lee, I.-Y.: A Digital nominative proxy signature scheme for mobile communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 451\u2013455. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science - ASIAN 2009. Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10622-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:31:59Z","timestamp":1606167119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10622-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106217","9783642106224"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10622-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}