{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T13:11:29Z","timestamp":1778159489296,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642319112","type":"print"},{"value":"9783642319129","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_15","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"219-234","source":"Crossref","is-referenced-by-count":6,"title":["Non-delegatable Strong Designated Verifier Signature on Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Tian","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhengtao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yusong","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"15_CR2","first-page":"390","volume-title":"Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS)","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Neven, G.: Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma. In: Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS), pp. 390\u2013399. ACM, Alexandria (2006)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11792086_31","volume-title":"Algorithmic Number Theory","author":"A.W. Dent","year":"2006","unstructured":"Dent, A.W., Galbraith, S.D.: Hidden Pairings and Trapdoor DDH Groups. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol.\u00a04076, pp. 436\u2013451. Springer, Heidelberg (2006)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/11935308_34","volume-title":"Information and Communications Security","author":"X. Huang","year":"2006","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal Designated Verifier Signature Without Delegatability. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 479\u2013498. Springer, Heidelberg (2006)"},{"issue":"1","key":"15_CR5","first-page":"82","volume":"6","author":"X. Huang","year":"2008","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short Designated Verifier Signature Scheme and Its Identity-based Variant. International Journal of Network Security\u00a06(1), 82\u201393 (2008)","journal-title":"International Journal of Network Security"},{"key":"15_CR6","unstructured":"Huang, Q., Susil, W., Wong, D.S.: Non-delegatable Identity-based Designated Verifier Signature. Cryptology ePrint Archive: Report 2009\/367 (2009)"},{"key":"15_CR7","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. Cryptology ePrint Archive: Report 2009\/518 (2009)"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jss.2010.08.057","volume":"84","author":"Q. Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. Journal of Systems and Software\u00a084(1), 120\u2013129 (2011)","journal-title":"Journal of Systems and Software"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/3-540-46766-1_36","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"I.B. Damg\u00e5rd","year":"1992","unstructured":"Damg\u00e5rd, I.B.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 445\u2013456. Springer, Heidelberg (1992)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 143\u2013154. Springer, Heidelberg (1996)"},{"issue":"2","key":"15_CR11","doi-asserted-by":"crossref","first-page":"239","DOI":"10.15388\/Informatica.2007.174","volume":"18","author":"P.K. Kancharla","year":"2007","unstructured":"Kancharla, P.K., Gummadidala, S., Saxena, A.: Identity Based Strong Designated Verifier Signature Scheme. Journal of Informatica\u00a018(2), 239\u2013252 (2007)","journal-title":"Journal of Informatica"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Katz, J., Wang, N.: Efficiency Improvements for Signature Schemes with Tight Security Reductions. In: 10th ACM Conference on Computer and Communications Security, pp. 155\u2013164. ACM Press (2003)","DOI":"10.1145\/948129.948132"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-540-30598-9_8","volume-title":"Security in Communication Networks","author":"F. Laguillaumie","year":"2005","unstructured":"Laguillaumie, F., Vergnaud, D.: Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 105\u2013119. Springer, Heidelberg (2005)"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.csi.2008.02.003","volume":"31","author":"J. Lee","year":"2009","unstructured":"Lee, J., Chang, J.: Comment on Saeednia et al.\u2019s strong designated verifier signature scheme. Journal of Computer Standards & Interfaces - CSI\u00a031(1), 258\u2013260 (2009)","journal-title":"Journal of Computer Standards & Interfaces - CSI"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/978-3-540-73549-6_116","volume-title":"Ubiquitous Intelligence and Computing","author":"Y. Li","year":"2007","unstructured":"Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated Verifier Signature: Definition, Framework and New Constructions. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.\u00a04611, pp. 1191\u20131200. Springer, Heidelberg (2007)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Liao, Y., Jia, C.: Designated verifier signature without random oracles. Communications, Circuits and Systems. In: IEEE International Conference on ICCCAS 2008, pp. 474\u2013477 (2008)","DOI":"10.1109\/ICCCAS.2008.4657817"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/11523468_38","volume-title":"Automata, Languages and Programming","author":"H. Lipmaa","year":"2005","unstructured":"Lipmaa, H., Wang, G., Bao, F.: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 459\u2013471. Springer, Heidelberg (2005)"},{"key":"15_CR18","unstructured":"Mao, W.: Modern cryptography: theory and practice. Prentice Hall Professional Technical Reference (2003)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-540-78440-1_8","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"S.F. Shahandashti","year":"2008","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 121\u2013140. Springer, Heidelberg (2008)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-24691-6_4","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S. Saeednia","year":"2004","unstructured":"Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 40\u201354. Springer, Heidelberg (2004)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.15388\/Informatica.2010.276","volume":"21","author":"X. Sun","year":"2010","unstructured":"Sun, X., Li, J., Hu, Y., Chen, G.: Delegatability of an Identity Based Strong Designated Verifier Signature Scheme. INFORMATICA\u00a021(1), 117\u2013122 (2010)","journal-title":"INFORMATICA"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/11599548_10","volume-title":"Information Security and Cryptology","author":"R. Tso","year":"2005","unstructured":"Tso, R., Okamoto, T., Okamoto, E.: Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol.\u00a03822, pp. 113\u2013127. Springer, Heidelberg (2005)"},{"key":"15_CR23","unstructured":"Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme, http:\/\/eprint.iacr.org\/2008\/507"},{"issue":"3","key":"15_CR24","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.ins.2007.07.005","volume":"178","author":"J. Zhang","year":"2008","unstructured":"Zhang, J., Mao, J.: A novel ID-based designated verifier signature scheme. Information Sciences\u00a0178(3), 766\u2013773 (2008)","journal-title":"Information Sciences"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:40Z","timestamp":1743739600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}