{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:36:43Z","timestamp":1754397403902},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642118418"},{"type":"electronic","value":"9783642118425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11842-5_26","type":"book-chapter","created":{"date-parts":[[2010,3,5]],"date-time":"2010-03-05T12:12:15Z","timestamp":1267791135000},"page":"198-205","source":"Crossref","is-referenced-by-count":3,"title":["A Fair Concurrent Signature Scheme Based on Identity"],"prefix":"10.1007","author":[{"given":"Xiaofang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24676-3_18","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"L. Chen","year":"2004","unstructured":"Chen, L., Kudla, C., Paterson, K.G.: Concurrent signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 287\u2013305. Springer, Heidelberg (2004)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-30191-2_2","volume-title":"Information and Communications Security","author":"W. Susilo","year":"2004","unstructured":"Susilo, W., Mu, Y., Zhang, F.: Perfect concurrent signature schemes. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 14\u201326. Springer, Heidelberg (2004)"},{"key":"26_CR3","first-page":"425","volume-title":"The 20th IFIP International Information Security Conference (IFIP\/SEC2005)","author":"W. Susilo","year":"2005","unstructured":"Susilo, W., Mu, Y.: Tripartite Concurrent Signatures. In: The 20th IFIP International Information Security Conference (IFIP\/SEC2005), pp. 425\u2013441. Springer, Boston (2005)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11602897_17","volume-title":"Information and Communications Security","author":"S. Chow","year":"2005","unstructured":"Chow, S., Susilo, W.: Generic construction of (identity-based) perfect concurrent signatures. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 194\u2013206. Springer, Heidelberg (2005)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/11935308_31","volume-title":"Information and Communications Security","author":"G. Wang","year":"2006","unstructured":"Wang, G., Bao, F., Zhou, J.: The Fairness of Perfect Concurrent Signatures. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 435\u2013451. Springer, Heidelberg (2006)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Z.J., Huang, R.F., Lin, X.Z.: Perfect Concurrent Signature Protocol. In: SNPD 2007, Qingdao, China, pp. 467\u2013472 (2007)","DOI":"10.1109\/SNPD.2007.366"},{"issue":"27","key":"26_CR7","first-page":"127","volume":"43","author":"X.F. Wu","year":"2007","unstructured":"Wu, X.F., Wang, X.F., Wang, S.P., et al.: Efficient identity-based concurrent signature scheme. Computer Engineering and Applications\u00a043(27), 127\u2013129 (2007)","journal-title":"Computer Engineering and Applications"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11496137_34","volume-title":"Applied Cryptography and Network Security","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M., Yiu, S.-M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 499\u2013512. Springer, Heidelberg (2005)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11842-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T14:08:30Z","timestamp":1552399710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11842-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642118418","9783642118425"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11842-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}