{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:42:42Z","timestamp":1777372962598,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642140808","type":"print"},{"value":"9783642140815","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14081-5_14","type":"book-chapter","created":{"date-parts":[[2010,9,24]],"date-time":"2010-09-24T16:22:49Z","timestamp":1285345369000},"page":"216-232","source":"Crossref","is-referenced-by-count":10,"title":["The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key"],"prefix":"10.1007","author":[{"given":"Jun","family":"Shao","sequence":"first","affiliation":[]},{"given":"Min","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"http:\/\/tdt.sjtu.edu.cn\/~jshao\/prcbib.htm"},{"key":"14_CR2","unstructured":"The Informed\u00a0Dialogue about Consumer Acceptability of DRM Solutions\u00a0in Europe\u00a0(INDICARE). Consumer Survey on Digital Music and DRM (2005), \n                    \n                      http:\/\/www.indicare.org\/survey"},{"key":"14_CR3","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: Internet Society (ISOC): NDSS 2005, pp. 29\u201343 (2005)"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC)\u00a09(1), 1\u201330 (2006)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: ACM CCS 2005, pp. 310\u2013319 (2005)","DOI":"10.1145\/1102120.1102161"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: ACM CCS 2006, pp. 390\u2013399 (2006)","DOI":"10.1145\/1180405.1180453"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM Journal of Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal of Computing"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/JPROC.2004.827357","volume":"92","author":"R. Koenen","year":"2004","unstructured":"Koenen, R., Lacy, J., Mackey, M., Mitchell, S.: The long march to interoperable digital rights management. Proceedings of the IEEE\u00a092(6), 883\u2013897 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"14_CR12","unstructured":"Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: ACM CCS 2008, pp. 511\u2013520 (2008), \n                    \n                      http:\/\/arxiv.org\/abs\/0802.1113v1"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-77026-8_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"J. Shao","year":"2007","unstructured":"Shao, J., Cao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random oracles. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 197\u2013209. Springer, Heidelberg (2007)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Taban, G., C\u00e1rdenas, A.A., Gligor, V.D.: Towards a Secure and Interoperable DRM Architecture. In: ACM DRM 2006, pp. 69\u201378 (2006)","DOI":"10.1145\/1179509.1179524"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14081-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:18:18Z","timestamp":1619785098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14081-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642140808","9783642140815"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14081-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}