{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:55:07Z","timestamp":1743144907575,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_1","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:09:52Z","timestamp":1741867792000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How to\u00a0Accomplish Key and\u00a0Communication Compression Over Authentication Channels"],"prefix":"10.1007","author":[{"given":"Yoshiro","family":"Matsuoka","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4802-8235","authenticated-orcid":false,"given":"Sohto","family":"Chiku","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3598-0988","authenticated-orcid":false,"given":"Keisuke","family":"Hara","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2861-359X","authenticated-orcid":false,"given":"Junji","family":"Shikata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013). https:\/\/doi.org\/10.1007\/s13389-013-0057-3","journal-title":"J. Cryptogr. Eng."},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-40041-4_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"J Alwen","year":"2013","unstructured":"Alwen, J., Krenn, S., Pietrzak, K., Wichs, D.: Learning with rounding, revisited. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 57\u201374. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_4"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005: 12th Conference on Computer and Communications Security, pp. 310\u2013319, Alexandria, Virginia, USA,\u00a07\u201311 November 2005. ACM Press (2005). https:\/\/doi.org\/10.1145\/1102120.1102161","DOI":"10.1145\/1102120.1102161"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/978-3-642-29011-4_42","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Banerjee","year":"2012","unstructured":"Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 719\u2013737. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_42"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054122"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Chen, L., Moody, D., Randall, K., Regenscheid, A., Robinson, A.: Recommendations for discrete logarithm-based cryptography: elliptic curve domain parameters (2023). https:\/\/doi.org\/10.6028\/NIST.SP.800-186. https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=935198","DOI":"10.6028\/NIST.SP.800-186"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-319-98113-0_9","volume-title":"Security and Cryptography for Networks","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., Kim, D., Lee, J., Song, Y.: Lizard: cut off the tail! A practical post-quantum public-key encryption from LWE and LWR. In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 160\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_9"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-85886-7_18","volume-title":"Information Security","author":"SSM Chow","year":"2008","unstructured":"Chow, S.S.M., Phan, R.C.-W.: Proxy re-signatures in the standard model. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 260\u2013276. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85886-7_18"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-319-70972-7_7","volume-title":"Financial Cryptography and Data Security","author":"D Derler","year":"2017","unstructured":"Derler, D., Ramacher, S., Slamanig, D.: Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 124\u2013142. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_7"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-15317-4_20","volume-title":"Security and Cryptography for Networks","author":"O Eikemeier","year":"2010","unstructured":"Eikemeier, O., et al.: History-free aggregate message authentication codes. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 309\u2013328. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_20"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-030-21568-2_18","volume-title":"Applied Cryptography and Network Security","author":"X Fan","year":"2019","unstructured":"Fan, X., Liu, F.-H.: Proxy re-encryption and re-signatures from lattices. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 363\u2013382. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_18"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-12475-9_7","volume-title":"Provable Security","author":"S Hirose","year":"2014","unstructured":"Hirose, S., Kuwakado, H.: Forward-secure sequential aggregate message authentication revisited. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 87\u2013102. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12475-9_7"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-540-79263-5_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"J Katz","year":"2008","unstructured":"Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 155\u2013169. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79263-5_10"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM CCS 2008: 15th Conference on Computer and Communications Security, pp. 511\u2013520, Alexandria, Virginia, USA,\u00a027\u201331 October 2008. ACM Press (2008). https:\/\/doi.org\/10.1145\/1455770.1455835","DOI":"10.1145\/1455770.1455835"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Luo, F., Al-Kuwari, S., Susilo, W., Duong, D.H.: Attribute-based proxy re-signature from standard lattices and its applications. Comput. Stand. Interfaces 75, 103499 (2021). https:\/\/doi.org\/10.1016\/j.csi.2020.103499. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S092054892030386X","DOI":"10.1016\/j.csi.2020.103499"},{"key":"1_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1007\/978-3-030-15032-7_110","volume-title":"Advanced Information Networking and Applications","author":"S Sato","year":"2020","unstructured":"Sato, S., Shikata, J.: Interactive aggregate message authentication scheme with detecting functionality. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) AINA 2019. AISC, vol. 926, pp. 1316\u20131328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-15032-7_110"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-77026-8_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"J Shao","year":"2007","unstructured":"Shao, J., Cao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random oracles. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 197\u2013209. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77026-8_15"},{"key":"1_CR18","unstructured":"Standards for Efficient Cryptography Group: SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Group (SECG), January 2010. https:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"1_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-031-54773-7_10","volume-title":"Applied Cryptography and Network Security","author":"E Wagner","year":"2024","unstructured":"Wagner, E., Serror, M., Wehrle, K., Henze, M.: When and how to aggregate message authentication codes on lossy channels? In: P\u00f6pper, C., Batina, L. (eds.) ACNS 2024. LNCS, vol. 14584, pp. 241\u2013264. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-54773-7_10"},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1007\/s11424-011-8370-3","volume":"24","author":"P Yang","year":"2011","unstructured":"Yang, P., Cao, Z., Dong, X.: Threshold proxy re-signature. J. Syst. Sci. Complexity 24(4), 816\u2013824 (2011)","journal-title":"J. Syst. Sci. Complexity"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:09:56Z","timestamp":1741867796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_1"}},"subtitle":["Proxy Re-authentication and Its Instantiations"],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}