{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:53:09Z","timestamp":1721454789684},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T00:00:00Z","timestamp":1546387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T00:00:00Z","timestamp":1546387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702541"],"award-info":[{"award-number":["61702541"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872087"],"award-info":[{"award-number":["61872087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2017QNRC001"],"award-info":[{"award-number":["2017QNRC001"]}]},{"name":"Science Research Plan Program by NUDT","award":["ZK17-03-46"],"award-info":[{"award-number":["ZK17-03-46"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s00779-018-01193-x","type":"journal-article","created":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T10:52:57Z","timestamp":1546426377000},"page":"849-862","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Asymmetric subversion attacks on signature and identification schemes"],"prefix":"10.1007","volume":"26","author":[{"given":"Yi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baosheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"1193_CR1","doi-asserted-by":"crossref","unstructured":"Liu C, Chen R, Wang Y et al (2018) Asymmetric subversion attacks on signature schemes. In: ACISP, pp 376\u2013395","DOI":"10.1007\/978-3-319-93638-3_22"},{"key":"1193_CR2","first-page":"2","volume":"6","author":"J Ball","year":"2013","unstructured":"Ball J, Borger J, Greenwald G et al (2013) Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian 6:2\u20138","journal-title":"The Guardian"},{"key":"1193_CR3","first-page":"1","volume":"5","author":"N Perlroth","year":"2013","unstructured":"Perlroth N, Larson J, Shane S (2013) NSA able to foil basic safeguards of privacy on web. NY Times 5:1\u20138","journal-title":"NY Times"},{"key":"1193_CR4","volume-title":"No place to hide: Edward Snowden, the NSA, and the US surveillance state","author":"G Greenwald","year":"2014","unstructured":"Greenwald G (2014) No place to hide: Edward Snowden, the NSA, and the US surveillance state. Macmillan, London"},{"key":"1193_CR5","unstructured":"Simmons GJ (1982) Message authentication without secrecy. In: AAAS selected symposia series, vol 69, pp 105\u2013139"},{"key":"1193_CR6","doi-asserted-by":"crossref","unstructured":"Simmons GJ (1983) Verification of treaty compliance\u2013revisited. In: 1983 IEEE symposium on security and privacy. IEEE, p 61","DOI":"10.1109\/SP.1983.10016"},{"key":"1193_CR7","doi-asserted-by":"crossref","unstructured":"Simmons GJ (1984) The subliminal channel and digital signatures. In: Workshop on the theory and application of of cryptographic techniques. Springer, pp 364\u2013378","DOI":"10.1007\/3-540-39757-4_25"},{"key":"1193_CR8","doi-asserted-by":"crossref","unstructured":"Young A, Yung M (1997) Kleptography: using cryptography against cryptography. In: EUROCRYPT, vol 97. Springer, pp 62\u201374","DOI":"10.1007\/3-540-69053-0_6"},{"key":"1193_CR9","doi-asserted-by":"crossref","unstructured":"Young A, Yung M (1996) The dark side of \u201cblack-box\u201d cryptography or: should we trust capstone?. In: CRYPTO, Springer, pp 89\u2013103","DOI":"10.1007\/3-540-68697-5_8"},{"key":"1193_CR10","doi-asserted-by":"crossref","unstructured":"Young A, Yung M (1997) The prevalence of kleptographic attacks on discrete-log based cryptosystems. In: CRYPTO, Springer, pp 264\u2013276","DOI":"10.1007\/BFb0052241"},{"key":"1193_CR11","doi-asserted-by":"crossref","unstructured":"Bellare M, Paterson KG, Rogaway P (2014) Security of symmetric encryption against mass surveillance. In: CRYPTO, pp 1\u201319","DOI":"10.1007\/978-3-662-44371-2_1"},{"key":"1193_CR12","doi-asserted-by":"crossref","unstructured":"Bellare M, Jaeger J, Kane D (2015) Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: ACM CCS, ACM, pp 1431\u20131440","DOI":"10.1145\/2810103.2813681"},{"key":"1193_CR13","doi-asserted-by":"crossref","unstructured":"Ateniese G, Magri B, Venturi D (2015) Subversion-resilient signature schemes. In: ACM CCS, ACM, pp 364\u2013375","DOI":"10.1145\/2810103.2813635"},{"key":"1193_CR14","doi-asserted-by":"crossref","unstructured":"Schnorr CP (1989) Efficient identification and signatures for smart cards. In: CRYPTO, pp 239\u2013252","DOI":"10.1007\/0-387-34805-0_22"},{"key":"1193_CR15","doi-asserted-by":"crossref","unstructured":"Boneh D (2011) Digital signature standard. In: Encyclopedia of cryptography and security, 2nd edn. p 347","DOI":"10.1007\/978-1-4419-5906-5_145"},{"key":"1193_CR16","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton"},{"issue":"4","key":"1193_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theor 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theor"},{"key":"1193_CR18","doi-asserted-by":"crossref","unstructured":"Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT, vol 3494. Springer, pp 114\u2013127","DOI":"10.1007\/11426639_7"},{"issue":"18","key":"1193_CR19","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"KG Paterson","year":"2002","unstructured":"Paterson KG (2002) ID-based signatures from pairings on elliptic curves. Electron Lett 38(18):1025\u20131026","journal-title":"Electron Lett"},{"key":"1193_CR20","doi-asserted-by":"crossref","unstructured":"Zhang F, Kim K (2002) ID-based blind signature and ring signature from pairings. In: ASIACRYPT, pp 629\u2013637","DOI":"10.1007\/3-540-36178-2_33"},{"key":"1193_CR21","doi-asserted-by":"crossref","unstructured":"Kurosawa K, Heng SH (2004) From digital signature to ID-based identification\/signature. In: PKC, pp 248\u2013261","DOI":"10.1007\/978-3-540-24632-9_18"},{"key":"1193_CR22","doi-asserted-by":"crossref","unstructured":"Mironov I, Stephens-Davidowitz N (2015) Cryptographic reverse firewalls. In: EUROCRYPT, Springer, pp 657\u2013686","DOI":"10.1007\/978-3-662-46803-6_22"},{"key":"1193_CR23","first-page":"984","volume":"2017","author":"M Fischlin","year":"2017","unstructured":"Fischlin M, Mazaheri S (2017) Self-guarding cryptographic protocols against algorithm substitution attacks. IACR Cryptology ePrint Archive 2017:984","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1193_CR24","doi-asserted-by":"crossref","unstructured":"Russell A, Tang Q, Yung M, Zhou H (2016) Cliptography: clipping the power of kleptographic attacks. In: ASIACRYPT, Part II, pp 34\u201364","DOI":"10.1007\/978-3-662-53890-6_2"},{"key":"1193_CR25","doi-asserted-by":"crossref","unstructured":"Dodis Y, Mironov I, Stephens-Davidowitz N (2016) Message transmission with reverse firewalls - secure communication on corrupted machines. In: CRYPTO, Part II, pp 341\u2013372","DOI":"10.1007\/978-3-662-53018-4_13"},{"key":"1193_CR26","doi-asserted-by":"crossref","unstructured":"Chen R, Mu Y, Yang G, Susilo W, Guo F, Zhang M (2016) Cryptographic reverse firewall via malleable smooth projective hash functions. In: ASIACRYPT, Part I, pp 844\u2013876","DOI":"10.1007\/978-3-662-53887-6_31"},{"key":"1193_CR27","doi-asserted-by":"crossref","unstructured":"Hofheinz D, Jager T, Knapp E (2012) Waters signatures with optimal security reduction. In: PKC, pp 66\u201383","DOI":"10.1007\/978-3-642-30057-8_5"},{"key":"1193_CR28","first-page":"530","volume":"2016","author":"A Russell","year":"2016","unstructured":"Russell A, Tang Q, Yung M, Zhou H (2016) Destroying steganography via amalgamation: kleptographically CPA secure public key encryption. IACR Cryptology ePrint Archive 2016 :530","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1193_CR29","doi-asserted-by":"crossref","unstructured":"Russell A, Tang Q, Yung M, Zhou H (2017) Generic semantic security against a kleptographic adversary. In: ACM CCS, pp 907\u2013922","DOI":"10.1145\/3133956.3133993"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-01193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-018-01193-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-01193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T06:10:54Z","timestamp":1654841454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-018-01193-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,2]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1193"],"URL":"https:\/\/doi.org\/10.1007\/s00779-018-01193-x","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,2]]},"assertion":[{"value":"29 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}