{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T10:16:20Z","timestamp":1648894580279},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,5,8]],"date-time":"2009-05-08T00:00:00Z","timestamp":1241740800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00607-009-0040-0","type":"journal-article","created":{"date-parts":[[2009,5,7]],"date-time":"2009-05-07T17:37:40Z","timestamp":1241717860000},"page":"137-151","source":"Crossref","is-referenced-by-count":1,"title":["Step-out group signatures"],"prefix":"10.1007","volume":"85","author":[{"given":"Marek","family":"Klonowski","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Krzywiecki","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Lauks","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,8]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese G, Camenisch J, Joye M, Tsudik G (2000) A practical and provably secure coalition-resistant group signature scheme. In: Advances in Cryptology\u2014CRYPTO. Lecture notes in computer science, vol 1880. Springer, Heidelberg, pp 255\u2013270","DOI":"10.1007\/3-540-44598-6_16"},{"key":"40_CR2","unstructured":"Bellare M, Micciancio D, Warinschi B (2003) Foundations of group signatures: formal definition, simplified requirements and a construction based on trapdoor permutations. In: Advances in Cryptology\u2014EUROCRYPT. Lecture Notes in Computer Science, Warsaw, Poland, vol 2656. Springer, Heidelberg, pp. 614\u2013629"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M, Micciancio D, Warinschi B (2003) Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions. In: Advances in cryptology\u2014EUROCRYPT. Lecture notes in computer science, vol 2656. Springer, Heidelberg, pp 614\u2013629","DOI":"10.1007\/3-540-39200-9_38"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in cryptology\u2014CRYPTO. Lecture Notes in computer science, vol 3152. Springer, Heidelberg, pp 41\u201355","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Camenisch J (1997) Efficient and generalized group signatures. In: EUROCRYPT. LNCS, vol 1233. Springer, Heidelberg, pp 465\u2013479","DOI":"10.1007\/3-540-69053-0_32"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Chaum D, van Heyst E (1991) Group signatures. In: Advances in cryptology\u2014EUROCRYPT. Lecture notes in computer science, vol 547. Springer, Heidelberg, pp 257\u2013265","DOI":"10.1007\/3-540-46416-6_22"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Dodis Y, Fazio N (2003) Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt Y (ed) Public key cryptography. LNCS, vol 2567. Springer, Heidelberg, pp 100\u2013115","DOI":"10.1007\/3-540-36288-6_8"},{"key":"40_CR8","unstructured":"Kim CH, Hwang YH, Lee PJ (2004) Practical pay-tv scheme using traitor tracing scheme for multiple channels. In: Lim CH, Yung M (eds) WISA. LNCS, vol 3325. Springer, Heidelberg, pp 264\u2013277"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Klonowski M, Krzywiecki L, Kuty\u0142owski M, Lauks A (2008) Step-out ring signatures. In: Mathematical foundations of computer science, 33rd International Symposium, MFCS. Lecture Notes in Computer Science, vol 5162. Springer, Heidelberg, pp 431\u2013442","DOI":"10.1007\/978-3-540-85238-4_35"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Krzywiecki L, Kubiak P, Kuty\u0142owski M (2006) A revocation scheme preserving privacy. In: Information Security and Cryptology, Inscrypt. Lecture notes in computer science, vol 4318. Springer, Heidelberg, pp 130\u2013143","DOI":"10.1007\/11937807_11"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Liu JK, Wei VK, Wong DS (2004) Linkable spontaneous anonymous group signature for ad hoc groups. In: ACISP 2004. Lecture notes in computer science, vol 3108. Springer, Heidelberg, pp 325\u2013335","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Manulis M (2006) Democratic group signatures: on an example of joint ventures. In: Proceedings of the ACM symposium on information, computer and communications security, ASIACCS. Taipei, Taiwan, ACM, p 365","DOI":"10.1145\/1128817.1128882"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Manulis M, Sadeghi AR, Schwenk J (2006) Linkable democratic group signatures. In: ISPEC. Lecture notes in computer science, vol 3903. Springer, Heidelberg, pp 187\u2013201","DOI":"10.1007\/11689522_18"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Naor M, Pinkas B (1999) Oblivious transfer and polynomial evaluation. In: STOC \u201999: Proceedings of the 31st annual ACM Symposium on Theory of Computing, ACM, pp 245\u2013254","DOI":"10.1145\/301250.301312"},{"issue":"11","key":"40_CR15","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11): 612\u2013613","journal-title":"Commun ACM"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Tsang PP, Wei VK, Chan TK, Au MH, Liu JK, Wong DS (2004) Separable linkable threshold ring signatures. In: INDOCRYPT. Lecture notes in computer science, vol 3348. Springer, Heidelberg, pp 384\u2013398","DOI":"10.1007\/978-3-540-30556-9_30"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Tzeng WG, Tzeng ZJ (2001) A public-key traitor tracing scheme with revocation using dynamic shares. In: Kim K (ed) Public key cryptography. LNCS, vol 1992. Springer, Heidelberg, pp 207\u2013224","DOI":"10.1007\/3-540-44586-2_16"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Wei VK (2005) Tracing-by-linking group signatures. In: Information Security, 8th International Conference, ISC. Lecture Notes in Computer Science, vol 3650. Springer, Heidelberg, pp. 149\u2013163","DOI":"10.1007\/11556992_11"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0040-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-009-0040-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0040-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:30:21Z","timestamp":1559140221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-009-0040-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,8]]},"references-count":18,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["40"],"URL":"https:\/\/doi.org\/10.1007\/s00607-009-0040-0","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,8]]}}}