{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:24:30Z","timestamp":1773512670014,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642163418","type":"print"},{"value":"9783642163425","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16342-5_7","type":"book-chapter","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T07:29:50Z","timestamp":1289892590000},"page":"93-107","source":"Crossref","is-referenced-by-count":8,"title":["Sanitizable Signatures with Strong Transparency in the Standard Model"],"prefix":"10.1007","author":[{"given":"Shivank","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Swarun","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Amjed","family":"Shareef","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bull, L., Sta\u00f1ski, P., Squire, D.: Content extraction signatures using xml digital signatures and custom transforms on-demand. In: WWW, pp. 170\u2013177 (2003)","DOI":"10.1145\/775152.775176"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable signatures. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 159\u2013177. Springer, Heidelberg (2005)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11927587_28","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"M. Klonowski","year":"2006","unstructured":"Klonowski, M., Lauks, A.: Extended sanitizable signatures. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 343\u2013355. Springer, Heidelberg (2006)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: ASIACCS, pp. 343\u2013354 (2006)","DOI":"10.1145\/1128817.1128868"},{"issue":"1","key":"7_CR5","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1093\/ietfec\/E88-A.1.239","volume":"88-A","author":"K. Miyazaki","year":"2005","unstructured":"Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Transactions\u00a088-A(1), 239\u2013246 (2005)","journal-title":"IEICE Transactions"},{"key":"7_CR6","first-page":"114","volume-title":"Research Reports on Mathematical and Computing Sciences","author":"M. Suzuki","year":"2005","unstructured":"Suzuki, M., Isshiki, T., Tanaka, K.: Sanitizable signature with secret information. In: Research Reports on Mathematical and Computing Sciences, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chang, E.C., Lim, C.L., Xu, J.: Short redactable signatures using random trees. In: CT-RSA, pp. 133\u2013147 (2009)","DOI":"10.1007\/978-3-642-00862-7_9"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-540-72163-5_6","volume-title":"Information Security Practice and Experience","author":"T. Izu","year":"2007","unstructured":"Izu, T., Kunihiro, N., Ohta, K., Takenaka, M., Yoshioka, T.: A sanitizable signature scheme with aggregation. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol.\u00a04464, pp. 51\u201364. Springer, Heidelberg (2007)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-540-89641-8_6","volume-title":"Cryptology and Network Security","author":"T.H. Yuen","year":"2008","unstructured":"Yuen, T.H., Susilo, W., Liu, J.K., Mu, Y.: Sanitizable signatures revisited. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 80\u201397. Springer, Heidelberg (2008)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11927587_28","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"M. Klonowski","year":"2006","unstructured":"Klonowski, M., Lauks, A.: Extended sanitizable signatures. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 343\u2013355. Springer, Heidelberg (2006)"},{"key":"7_CR12","first-page":"317","volume-title":"Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography","author":"C. Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schr\u00f6der, D., Volk, F.: Security of sanitizable signatures revisited. In: Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, pp. 317\u2013336. Springer, Heidelberg (2009)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Kumar, S., Shareef, A., Rangan, C.P.: Sanitizable signatures with strong transparency in the standard model (full version). Cryptology ePrint Archive (2010), http:\/\/eprint.iacr.org\/ .","DOI":"10.1007\/978-3-642-16342-5_7"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R. Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"7_CR15","unstructured":"Kunihiko, M., Susaki Seiichi, I.M.: Digital document sanitizing problem. In: CIEIC Technical Report (Institute of Electronics, Information and Communication Engineers), pp. 61\u201367 (2003)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1145\/1368310.1368362","volume-title":"ASIACCS 2008: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security","author":"S. Haber","year":"2008","unstructured":"Haber, S., Hatano, Y., Honda, Y., Horne, W., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: ASIACCS 2008: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, pp. 353\u2013362. ACM, New York (2008)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-78967-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Groth","year":"2008","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 415\u2013432. Springer, Heidelberg (2008)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/11602897_7","volume-title":"Information and Communications Security","author":"T. Izu","year":"2005","unstructured":"Izu, T., Kanaya, N., Takenaka, M., Yoshioka, T.: Piats: A partially sanitizable signature scheme. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 72\u201383. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16342-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:47:25Z","timestamp":1606168045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16342-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163418","9783642163425"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16342-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}