{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:23:27Z","timestamp":1761675807951,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163418"},{"type":"electronic","value":"9783642163425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16342-5_5","type":"book-chapter","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T12:29:50Z","timestamp":1289910590000},"page":"60-74","source":"Crossref","is-referenced-by-count":6,"title":["Pairing-Based Nominative Signatures with Selective and Universal Convertibility"],"prefix":"10.1007","author":[{"given":"Wei","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Dingfeng","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Antwerpen, H.V.: Udeniable signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 212\u2013216. Springer, Heidelberg (1990)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"D. Chaum","year":"1991","unstructured":"Chaum, D.: Zero-knowledge udeniable signature. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 458\u2013464. Springer, Heidelberg (1991)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-45146-4_8","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithm. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 126\u2013144. Springer, Heidelberg (2003)"},{"key":"5_CR4","unstructured":"Guo, L., Wang, G., Wong, D., Hu, L.: Further discussions on the security of a nominative signature scheme. In: The 2007 International Conference on Security & Management - SAM 2007, pp. 566\u2013572. CSREA Press (2007), Cryptology ePrint Archive, Report 2006\/007"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1504\/IJACT.2008.021086","volume":"1","author":"Q. Huang","year":"2008","unstructured":"Huang, Q., Liu, D.Y.W., Wong, D.S.: An efficient one-move nominative signature scheme. International Journal of Applied Cryptography (IJACT)\u00a01(2), 133\u2013143 (2008)","journal-title":"International Journal of Applied Cryptography (IJACT)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-540-73489-5_21","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"X. Huang","year":"2007","unstructured":"Huang, X., Mu, Y., Susilo, W., Wu, W.: Provably secure pairing-based convertible undeniable signature with short signature length. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol.\u00a04575, pp. 367\u2013391. Springer, Heidelberg (2007)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-27800-9_30","volume-title":"Information Security and Privacy","author":"Z. Huang","year":"2004","unstructured":"Huang, Z., Wang, Y.: Convertible nominative signatures. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 348\u2013357. Springer, Heidelberg (2004)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/11426639_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"K. Kurosawa","year":"2005","unstructured":"Kurosawa, K., Heng, S.: 3-Move undeniable signature scheme. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 181\u2013197. Springer, Heidelberg (2005)"},{"key":"5_CR9","unstructured":"Kim, S.J., Park, S.J., Won, D.H.: Zero-knowledge nominative sinatures. In: Pragocrypt 1996, International Conference on the Theory and Applications of Cryptology, pp. 380\u2013392 (1996)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D.Y.W., Chang, S., Wong, D.S.: A more efficient convertible nominative signature. In: International Conference on Security and Cryptography - SECRYPT 2007, pp. 214\u2013221 (2007)","DOI":"10.5220\/0002124402140221"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-540-75651-4_27","volume-title":"Advances in Information and Computer Security","author":"D.Y.W. Liu","year":"2007","unstructured":"Liu, D.Y.W., Chang, S., Wong, D.S., Mu, Y.: Nominative signature from ring signature. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 396\u2013411. Springer, Heidelberg (2007)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-540-77048-0_5","volume-title":"Information and Communications Security","author":"D.Y.W. Liu","year":"2007","unstructured":"Liu, D.Y.W., Wong, D.S., Huang, X., Wang, G., Huang, Q., Mu, Y., Susilo, W.: Formal definition and construction of nominative signature. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 57\u201368. Springer, Heidelberg (2007)"},{"issue":"5","key":"5_CR13","doi-asserted-by":"publisher","first-page":"2006","DOI":"10.1109\/TIT.2006.872853","volume":"52","author":"W. Ogata","year":"2006","unstructured":"Ogata, W., Kurosawa, K., Heng, S.H.: The secutity of the FDH variant of Chaum\u2019s undeniable signature scheme. IEEE Tansactions on Information Theory\u00a052(5), 2006\u20132017 (2006)","journal-title":"IEEE Tansactions on Information Theory"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/11506157_28","volume-title":"Information Security and Privacy","author":"W. Susilo","year":"2005","unstructured":"Susilo, W., Mu, Y.: On the security of nominative signatures. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 329\u2013335. Springer, Heidelberg (2005)"},{"key":"5_CR15","series-title":"New Approaches for Security, Privacy and Trust in Complex Environments","first-page":"265","volume-title":"IFIP International Federation for Information Processing","author":"G. Wang","year":"2007","unstructured":"Wang, G., Bao, F.: Security remarks on a convertible nominative signature scheme. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) IFIP International Federation for Information Processing. New Approaches for Security, Privacy and Trust in Complex Environments, vol.\u00a0232, pp. 265\u2013275. Springer, Boston (2007)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-01440-6_4","volume-title":"Information Security and Cryptology","author":"W. Zhao","year":"2009","unstructured":"Zhao, W., Lin, C.L., Ye, D.F.: Provably secure convertible nominative signature scheme. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol.\u00a05487, pp. 23\u201340. Springer, Heidelberg (2009)"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/ICYCS.2008.313","volume-title":"Proc. of the 9th International Conference for Young Computer Scientists - ICYCS 2008","author":"W. Zhao","year":"2008","unstructured":"Zhao, W., Ye, D.: Modified Huang-Wang\u2019s convertible nominative signature scheme. In: Proc. of the 9th International Conference for Young Computer Scientists - ICYCS 2008, pp. 2090\u20132095. IEEE Computer Society, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16342-5_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T21:39:24Z","timestamp":1740692364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16342-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163418","9783642163425"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16342-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}