{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:10:38Z","timestamp":1773195038216,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T00:00:00Z","timestamp":1432252800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s00500-015-1704-7","type":"journal-article","created":{"date-parts":[[2015,5,21]],"date-time":"2015-05-21T12:27:55Z","timestamp":1432211275000},"page":"1781-1791","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Random oracle-based anonymous credential system for efficient attributes proof on smart devices"],"prefix":"10.1007","volume":"20","author":[{"given":"Nan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Hwagyoo","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,22]]},"reference":[{"key":"1704_CR1","doi-asserted-by":"crossref","unstructured":"Akagi N, Manabe Y, Okamoto T (2008) An efficient anonymous credential system. In: LNCS, financial cryptography and data security, vol 5143, pp 272\u2013286","DOI":"10.1007\/978-3-540-85230-8_25"},{"key":"1704_CR2","doi-asserted-by":"crossref","unstructured":"Au MH, Tsang PP, Susilo W, Mu Y (2009) Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: LNCS, topics in cryptology C CT-RSA, vol 5473, pp 295\u2013308","DOI":"10.1007\/978-3-642-00862-7_20"},{"key":"1704_CR3","unstructured":"Baldimtsi F, Lysyanskaya A (2012) Anonymous credentials light. In: IACR cryptology ePrint Archive, p 298"},{"key":"1704_CR4","doi-asserted-by":"crossref","unstructured":"Bauer D, Blough DM, Cash D (2008) Minimal information disclosure with efficiently verifiable credentials. In: ACM, DIM \u201908 proceedings of the 4th ACM workshop on digital identity management, pp. 15\u201324","DOI":"10.1145\/1456424.1456428"},{"key":"1704_CR5","doi-asserted-by":"crossref","unstructured":"Belenkiy M, Chase M, Kohlweiss M, Lysyanskaya A (2008) P-signatures and noninteractive anonymous credentials. In: LNCS, theory of cryptography, vol 4948, pp 356\u2013374","DOI":"10.1007\/978-3-540-78524-8_20"},{"key":"1704_CR6","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TSMCC.2010.2045755","volume":"40","author":"A Bhargav-Spantzel","year":"2010","unstructured":"Bhargav-Spantzel A, Squicciarini AC, Xue R, Bertino E (2010) Multifactor identity verification using aggregated proof of knowledge. IEEE Trans Syst Man Cybern 40:372\u2013383","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1704_CR7","unstructured":"Bhargav-Spantzel A, Squicciarini AC, Xue R, Bertino E (2006) Practical identity theft prevention using aggregated proof of knowledge. In: CERIAS TR, technical report, CS Department"},{"key":"1704_CR8","doi-asserted-by":"crossref","unstructured":"Bichsel P, Camenisch J, Gro\u00df T, Shoup V (2009) Anonymous credentials on a standard java card. In: ACM, CCS \u201909 proceedings of the 16th ACM conference on computer and communications security, pp 600\u2013610","DOI":"10.1145\/1653662.1653734"},{"key":"1704_CR9","doi-asserted-by":"crossref","unstructured":"Bichsel P, Camenisch J, Preiss F-S (2011) A comprehensive framework enabling data-minimizing authentication. In: ACM, CCS \u201911 proceedings of the 18th ACM conference on computer and communications security, pp 733\u2013736","DOI":"10.1145\/2046642.2046647"},{"key":"1704_CR10","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT 2003, LNCS, vol 2656, pp 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"1704_CR11","doi-asserted-by":"crossref","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Asiacrypt 2001, LNCS, vol 2248, pp 514\u2013532","DOI":"10.1007\/3-540-45682-1_30"},{"key":"1704_CR12","doi-asserted-by":"crossref","unstructured":"Boyen X, Waters B (2007) Full-domain subgroup hiding and constant-size group signatures. In: LNCS, public key cryptography, vol 4450, pp 1\u201315","DOI":"10.1007\/978-3-540-71677-8_1"},{"key":"1704_CR13","unstructured":"Brands S (1993) Untraceable online cash in wallets with observers. In: CRYPTO \u201993: 13th annual international cryptology conference. Springer, New York, pp 302\u2013318"},{"key":"1704_CR14","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MSP.2012.7","volume":"10","author":"J Camenisch","year":"2012","unstructured":"Camenisch J, Zurich Zurich, Lehmann A, Neven G (2012) Electronic identities need private credentials. IEEE Secur Priv 10:80\u201383","journal-title":"IEEE Secur Priv"},{"key":"1704_CR15","doi-asserted-by":"crossref","unstructured":"Camenisch J, Dubovitskaya M et al (2013) Concepts and languages for privacy-preserving attribute-based authentication. In: Policies and research in identity management, vol 396. Springer, Heidelberg, pp 34\u201352","DOI":"10.1007\/978-3-642-37282-7_4"},{"key":"1704_CR16","doi-asserted-by":"crossref","unstructured":"Camenisch J, Gro\u00df T (2008) Efficient attributes for anonymous credentials. In: ACM, CCS \u201908 proceedings of the 15th ACM conference on computer and communications security, pp 345\u2013356","DOI":"10.1145\/1455770.1455814"},{"key":"1704_CR17","doi-asserted-by":"crossref","unstructured":"Camenisch J, Kohlweiss M, Soriente C (2009) An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: LNCS, public key cryptography vol 5443, pp 481\u2013500","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"1704_CR18","doi-asserted-by":"crossref","unstructured":"Camenisch J, Lysyanskaya A (2004) Signature schemes and anonymous credentials from bilinear maps. In: Advances in cryptology\u2014LNCS, vol 72. Springer, Heidelberg, pp 3152:56","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"1704_CR19","doi-asserted-by":"crossref","unstructured":"Canard S, Lescuyer R (2011) Anonymous credentials from (indexed) aggregate signatures. In: ACM, DIM \u201911 proceedings of the 7th ACM workshop on digital identity management, pp 53\u201362","DOI":"10.1145\/2046642.2046655"},{"key":"1704_CR20","doi-asserted-by":"crossref","unstructured":"Canard S, Lescuyer R, Traor\u00e9 J (2011) Multi-show anonymous credentials with encrypted attributes in the standard model. In: cryptology and network security, LNCS, vol 3531, pp 318\u2013333","DOI":"10.1007\/978-3-642-25513-7_15"},{"key":"1704_CR21","unstructured":"Chaum D (1985) Transaction systems to make big brother obsolete. In: ACM, communications of the ACM, vol28, pp 1030\u20131044"},{"key":"1704_CR22","doi-asserted-by":"crossref","unstructured":"Guo N, Cheng J, Zhang B, Yim K (2013) Aggregate signature-based efficient attributes proof with pairing-based anonymous credential. In: 16th international conference on network-based information systems, pp 276\u2013281","DOI":"10.1109\/NBiS.2013.42"},{"key":"1704_CR23","doi-asserted-by":"crossref","unstructured":"Guo N, Jin Y, Yim K (2014) Anonymous credential-based privacy-preserving identity verification for business processes. In: 2014 Eighth international conference on innovative mobile and internet services in ubiquitous computing, pp 554\u2013559","DOI":"10.1109\/IMIS.2014.80"},{"key":"1704_CR24","doi-asserted-by":"crossref","unstructured":"Izabach\u00e8ne M, Libert B, Vergnaud D (2011) Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes. In: LNCS, cryptography and coding, vol 7089, pp 431\u2013450","DOI":"10.1007\/978-3-642-25516-8_26"},{"key":"1704_CR25","first-page":"340","volume":"13","author":"Jiangtao Li","year":"2006","unstructured":"Li Jiangtao, Ninghui Li (2006) OACerts: oblivious attribute certificates. IEEE Trans Dependable Secur Comput 13:340\u2013352","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1704_CR26","doi-asserted-by":"crossref","unstructured":"Li J, Li N (2006) A Construction for general and efficient oblivious commitment based envelope protocols. In: LNCS, information and communications security, vol 4307, pp 122\u2013138","DOI":"10.1007\/11935308_10"},{"key":"1704_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen L, Safavi-Naini R (2005) Dynamic k-times anonymous authentication. In: LNCS, applied cryptography and network security, vol 3531, pp 318\u2013333","DOI":"10.1007\/11496137_22"},{"key":"1704_CR28","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s12394-009-0022-6","volume":"2","author":"F Paci","year":"2009","unstructured":"Paci F, Bauer D, Bertino E, Blough DM, Squicciarini AC (2009) Minimal credential disclosure in trust negotiations. Identity Inf Soc 2:221\u2013239","journal-title":"Identity Inf Soc"},{"key":"1704_CR29","doi-asserted-by":"crossref","unstructured":"Steuer K Jr, Fernando R, Bertino E (2010) Privacy preserving identity attribute verification in windows cardspace. In: ACM, DIM \u201910, proceedings of the 6th ACM workshop on digital identity management, pp 13\u201316","DOI":"10.1145\/1866855.1866860"},{"key":"1704_CR30","doi-asserted-by":"crossref","unstructured":"Sudarsono A, Nakanishi T, Funabiki N (2011) Efficient proofs of attributes in pairing-based anonymous credential system. In: LNCS, privacy enhancing technologies, vol 6794, pp 246\u2013263","DOI":"10.1007\/978-3-642-22263-4_14"},{"key":"1704_CR31","doi-asserted-by":"crossref","unstructured":"Zhang Y, Feng D (2012) Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: LNCS, information and communications security, vol 7618, pp 408\u2013415","DOI":"10.1007\/978-3-642-34129-8_39"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1704-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1704-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1704-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T22:51:50Z","timestamp":1553640710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1704-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,22]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["1704"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1704-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,22]]}}}