{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:57:06Z","timestamp":1725569826922},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642174544"},{"type":"electronic","value":"9783642174551"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17455-1_9","type":"book-chapter","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T15:31:49Z","timestamp":1290007909000},"page":"136-146","source":"Crossref","is-referenced-by-count":11,"title":["Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability"],"prefix":"10.1007","author":[{"given":"Lingbo","family":"Wei","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Sun, X., Lin, X., Ho, P.: Secure Vehicular Communications based on Group Signature and ID-based Signature Scheme. In: IEEE ICC 2007, Glasgow, Scotland, pp. 1539\u20131545 (2007)","DOI":"10.1109\/ICC.2007.258"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ma, L., Su, W., Wang, Y.: Privacy-Preserving Authentication based on Short Group Signature in Vehicular Networks. In: IEEE Symposiun on Data, Privacy and E-Commerce 2007, Chengdu, China, pp. 138\u2013142 (2007)","DOI":"10.1109\/ISDPE.2007.53"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-48390-X_15","volume-title":"Financial Cryptography","author":"G. Ateniese","year":"1999","unstructured":"Ateniese, G., Tsudik, G.: Some open issues and new directions in group signature schemes. In: Franklin, M. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 196\u2013211. Springer, Heidelberg (1999)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","first-page":"45","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 45\u201355. Springer, Heidelberg (2004)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 255\u2013270. Springer, Heidelberg (2000)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-45708-9_5","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"J. Camenisch","year":"2002","unstructured":"Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 61\u201376. Springer, Heidelberg (2002)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44586-2_15","volume-title":"Public Key Cryptography","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Stern, J.: Efficient revocation in group signatures. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 190\u2013206. Springer, Heidelberg (2001)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-36504-4_14","volume-title":"Financial Cryptography","author":"G. Ateniese","year":"2002","unstructured":"Ateniese, G., Song, D., Tsudik, G.: Quasi-efficient revocation in group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 183\u2013197. Springer, Heidelberg (2002)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/1030083.1030106","volume-title":"ACM CCS 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Shacham, H.: Group signatures with verifer-local revocation. In: ACM CCS 2004, Washington, DC, USA, pp. 168\u2013177. ACM Press, New York (2004)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/11593447_29","volume-title":"ASIACRYPT 2005","author":"T. Nakanishi","year":"2005","unstructured":"Nakanishi, T., Funabiki, N.: Verifer-local revocation group signature schemes with backward unlinkability from bilinear maps. In: Roy, B., et al. (eds.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 533\u2013548. Springer, Heidelberg (2005)"},{"issue":"9","key":"9_CR12","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1093\/ietfec\/e90-a.9.1793","volume":"E90-A","author":"T. Nakanishi","year":"2007","unstructured":"Nakanishi, T., Funabiki, N.: A short verifer-local revocation group signature schemes with backward unlinkability. IEICE Trans. Fundamentals\u00a0E90-A(9), 1793\u20131802 (2007); Also in Yoshiura, H. et. al. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 17\u201332. Springer, Heidelberg (2006)","journal-title":"IEICE Trans. Fundamentals"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/11935070_8","volume-title":"Cryptology and Network Security","author":"S. Zhou","year":"2006","unstructured":"Zhou, S., Lin, D.: Shorter Verifier-local revocation group signatures from bilinear maps. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 126\u2013143. Springer, Heidelberg (2006); Full vesion is avialable at Cryptology ePrint Archive, Report 2006\/286 (2006)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-540-30574-3_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M. Bellare","year":"2005","unstructured":"Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 136\u2013153. Springer, Heidelberg (2005)"},{"issue":"5","key":"9_CR15","first-page":"1234","volume":"E84-A","author":"A. Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals\u00a0E84-A(5), 1234\u20131243 (2001)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Lynnd, B., Shachamd, H.: Short signatures from the Weil pairing. J. of Cryptology\u00a017(4), 297\u2013319 (2004); Extended abstract in Boyd, C. (ed.): ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)","journal-title":"J. of Cryptology"},{"issue":"2","key":"9_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D. Boneh","year":"2008","unstructured":"Boneh, D., Boyen, X.: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. of Cryptology\u00a021(2), 149\u2013177 (2008)","journal-title":"J. of Cryptology"},{"issue":"16","key":"9_CR18","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S. Galbraith","year":"2008","unstructured":"Galbraith, S., Paterson, K., Smart, N.: Pairings for cryptographers. J. of Discrete Applied Mathematics\u00a0156(16), 3113\u20133121 (2008)","journal-title":"J. of Discrete Applied Mathematics"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography - Pairing 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17455-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:48:48Z","timestamp":1619786928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17455-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174544","9783642174551"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17455-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}