{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:50:17Z","timestamp":1757778617049,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175688"},{"type":"electronic","value":"9783642175695"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17569-5_40","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T01:24:09Z","timestamp":1290734649000},"page":"402-412","source":"Crossref","is-referenced-by-count":1,"title":["High Flexible Sanitizing Signature Scheme Based on Bilinear Maps"],"prefix":"10.1007","author":[{"given":"Wen-Chung","family":"Kuo","sequence":"first","affiliation":[]},{"given":"Jiin-Chiou","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yen-Hung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Lih-Chyau","family":"Wuu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-00468-1_18","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"C. Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schroder, D., Volk, F.: Security of Sanitizable Signatures Revisited. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography \u2013 PKC 2009. LNCS, vol.\u00a05443, pp. 317\u2013336. Springer, Heidelberg (2009)"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","first-page":"219","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklon, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 219\u2013229. Springer, Heidelberg (2001)"},{"key":"40_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Eurocrypt 2003","author":"D. Bonsh","year":"2003","unstructured":"Bonsh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Atenises","year":"2005","unstructured":"Atenises, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable Signature. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 159\u2013177. Springer, Heidelberg (2005)"},{"key":"40_CR5","unstructured":"Miyazaki, K., Susaki, S., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H.: Digital Document Sanitizing Problem. IEICE Technical Report, ISEC2003-20, 61-67 (2003)"},{"issue":"1","key":"40_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1093\/ietfec\/E88-A.1.239","volume":"88","author":"K. Miyazaki","year":"2005","unstructured":"Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Trans. Fundamentals\u00a0E88-A(1), 239\u2013246 (2005)","journal-title":"IEICE Trans. Fundamentals"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Miyazaki, K., Hanaoka, G., Imai, H.: Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps. In: ASIACCS, pp. 343\u2013354 (2006)","DOI":"10.1145\/1128817.1128868"},{"key":"40_CR8","unstructured":"National Institute of Standards and Technology, Digital Signature Standard (DSS) (1991)"},{"issue":"2","key":"40_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Comm. of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Comm. of the ACM"},{"key":"40_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology - ICISC 2001","author":"R. Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content Extraction Signatures. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, p. 285. Springer, Heidelberg (2002)"},{"issue":"4","key":"40_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. on Information Theory"},{"key":"40_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/11602897_7","volume-title":"Information and Communications Security","author":"T. Izu","year":"2005","unstructured":"Izu, T., Kanaya, N., Takenaka, M., Yoshioka, T.: PIATS: A Partially Sanitizable Signature Scheme. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 72\u201383. Springer, Heidelberg (2005)"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Masubuchi, T., Takatsuka, M., Sasaki, R.: A Digital Document Flexible Sanitizing Scheme. In: IEEE Conference on IIH-MSP, pp. 89\u201392 (December 2006)","DOI":"10.1109\/IIH-MSP.2006.264961"},{"key":"40_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-540-72163-5_6","volume-title":"Information Security Practice and Experience","author":"T. Izu","year":"2007","unstructured":"Izu, T., Kunihiro, N., Ohta, K., Takenaka, M., Yoshioka, T.: A Sanitizable Signature Scheme with Aggregation. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol.\u00a04464, pp. 51\u201364. Springer, Heidelberg (2007)"},{"key":"40_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-540-89641-8_6","volume-title":"Cryptology and Network Security","author":"T.H. Yuen","year":"2008","unstructured":"Yuen, T.H., Susilo, W., Liu, J.K., Mu, Y.: Sanitizable Signature Revisited. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 80\u201397. Springer, Heidelberg (2008)"},{"key":"40_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-00306-6_10","volume-title":"Information Security Applications","author":"T. Izu","year":"2009","unstructured":"Izu, T., Kunihiro, N., Ohta, K., Sano, M., Takenaka, M.: Sanitizable and Deletable Signature. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol.\u00a05379, pp. 130\u2013144. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17569-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:17:35Z","timestamp":1558293455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17569-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175688","9783642175695"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17569-5_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}