{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T01:00:26Z","timestamp":1701133226351},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,12,8]],"date-time":"2009-12-08T00:00:00Z","timestamp":1260230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s10115-009-0273-4","type":"journal-article","created":{"date-parts":[[2009,12,7]],"date-time":"2009-12-07T13:52:55Z","timestamp":1260193975000},"page":"87-103","source":"Crossref","is-referenced-by-count":2,"title":["Restrictive partially blind signature for resource-constrained information systems"],"prefix":"10.1007","volume":"26","author":[{"given":"Weidong","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Bozhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Long","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,8]]},"reference":[{"key":"273_CR1","doi-asserted-by":"crossref","unstructured":"Abe M, Fujisaki E (1996) How to date blind signatures. In: Advances in Cryptology-ASIACRYPT\u201996, LNCS 1163, pp 244\u2013251","DOI":"10.1007\/BFb0034851"},{"key":"273_CR2","doi-asserted-by":"crossref","unstructured":"Abe M, Okamoto T (2000) Provably secure partially blind signatures. Advance in Cryptology-CRYPTO\u201900, LNCS 1880, pp 271\u2013286","DOI":"10.1007\/3-540-44598-6_17"},{"issue":"1","key":"273_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-002-0092-3","volume":"6","author":"M Albers","year":"2004","unstructured":"Albers M, Jonker CM, Karami M, Treur J (2004) Agent models and different user ontologies for an electronic market place. J Knowl Inf Syst 6(1): 1\u201341","journal-title":"J Knowl Inf Syst"},{"issue":"3","key":"273_CR4","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1145\/1151690.1151692","volume":"24","author":"KC Barr","year":"2006","unstructured":"Barr KC, Asanovic K (2006) Energy aware lossless data compression. ACM Trans Comput Syst 24(3): 250\u2013291","journal-title":"ACM Trans Comput Syst"},{"key":"273_CR5","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS\u201993, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"273_CR6","unstructured":"Brands S (1993) An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, March 1993"},{"key":"273_CR7","doi-asserted-by":"crossref","unstructured":"Chaum D (1983) Blind signature for untraceable payments. In: Advances in Cryptology-CRYPTO\u201982, pp 199\u2013203","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"1","key":"273_CR8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/s10115-003-0127-4","volume":"7","author":"QF Chen","year":"2005","unstructured":"Chen QF, Zhang CQ, Zhang SC (2005) A logical framework for verifying secure transaction protocols. J Knowl Inf Syst 7(1): 84\u2013109","journal-title":"J Knowl Inf Syst"},{"key":"273_CR9","doi-asserted-by":"crossref","unstructured":"Chen XF, Zhang F, Mu Y, Susilo W (2006) Efficient provably secure restrictive partially blind signatures from bilinear pairings. In: Financial Cryptography and Data Security 2006, LNCS 4107, pp 251\u2013265","DOI":"10.1007\/11889663_21"},{"issue":"2","key":"273_CR10","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.jss.2006.02.046","volume":"80","author":"XF Chen","year":"2007","unstructured":"Chen XF, Zhang F, Liu S (2007) ID-based restrictive partially blind signatures and applications. J Syst Softw 80(2): 164\u2013171","journal-title":"J Syst Softw"},{"key":"273_CR11","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1137\/0214007","volume":"14","author":"CM Fiduccia","year":"1985","unstructured":"Fiduccia CM (1985) An efficient formula for linear recurrences. SIAM J Comput 14: 106\u2013112","journal-title":"SIAM J Comput"},{"key":"273_CR12","unstructured":"Giulian KJ, Gong G (2004) New LFSR-based cryptosystems and the Trace discrete log problem (Trace-DLP). SETA 2004, LNCS 3486, pp 298\u2013312"},{"key":"273_CR13","volume-title":"Shift register sequences","author":"S Golomb","year":"1982","unstructured":"Golomb S (1982) Shift register sequences. Aegean Park, Laguna Hills"},{"key":"273_CR14","doi-asserted-by":"crossref","first-page":"2601","DOI":"10.1109\/18.796413","volume":"24","author":"G Gong","year":"1999","unstructured":"Gong G, Harn L (1999) Public-key cryptosystems based on cubic finite field extensions. IEEE Trans IT 24: 2601\u20132605","journal-title":"IEEE Trans IT"},{"key":"273_CR15","doi-asserted-by":"crossref","unstructured":"Gong Z, Long Y, Chen K (2007) Efficient partially blind signature from LFSR. In: SNPD 2007, IEEE Computer Society Proceedings, August 2007, pp 717\u2013722","DOI":"10.1109\/SNPD.2007.130"},{"key":"273_CR16","doi-asserted-by":"crossref","unstructured":"Lenstra A, Verheul E (2000) The XTR public key System. In: Advances in Cryptology-Crypto 2000, LNCS 1880, pp 1\u201319","DOI":"10.1007\/3-540-44598-6_1"},{"key":"273_CR17","doi-asserted-by":"crossref","unstructured":"Maitland G, Boyd C (2002) A provably secure restrictive partially blind signature scheme. In: PKC 2002, LNCS 2274, pp 99\u2013114","DOI":"10.1007\/3-540-45664-3_7"},{"key":"273_CR18","unstructured":"Niederreiter H (1993) Finite fields and cryptology. Finite fields, coding theory, and advances in communications and computing. M.Dekker, New York, pp 359\u2013373"},{"key":"273_CR19","doi-asserted-by":"crossref","unstructured":"Okamoto T (2006) Efficient blind and partially blind signatures without random oracles. In: Halevi S, Rabin T (eds) TCC 2006, LNCS 3876, pp 80\u201399","DOI":"10.1007\/11681878_5"},{"issue":"3","key":"273_CR20","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptology 13(3): 361\u2013396","journal-title":"J Cryptology"},{"issue":"3","key":"273_CR21","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr CP (1991) Efficient signature generation by smart cards. J Cryptology 4(3): 161\u2013174","journal-title":"J Cryptology"},{"key":"273_CR22","unstructured":"Shamir A (2008) Cube attacks on tweakable black box polynomials. In: Crypto\u201908, invited talk"},{"key":"273_CR23","doi-asserted-by":"crossref","unstructured":"Chow SSM, Hui LCK, Yiu SM, Chow KP (2005) Two improved partially blind signature schemes from bilinear pairings. In: Boyd C, Gonzalez Nieto JM (eds) ACISP 2005, LNCS 3574, pp 316\u2013328. Full version at Cryptology ePrint Archive, Report 2004\/108","DOI":"10.1007\/11506157_27"},{"key":"273_CR24","unstructured":"Shoup V NTL: a library for doing number theory. http:\/\/www.shoup.net\/ntl\/WinNTL-5_5_1.zip"},{"key":"273_CR25","unstructured":"Sin S GH-PKC software implementation. http:\/\/comsec.uwaterloo.ca\/projects.html#gh"},{"key":"273_CR26","unstructured":"Smith P, Skinner C (1994) A public-key cryptosystem and a digital signature system based on the lucas function analogue to discrete logarithms. In: Advances in Cryptopogy-Asiacrypt\u201994, LNCS 917, pp 357\u2013364"},{"key":"273_CR27","first-page":"1213","volume":"E86-A","author":"C Tan","year":"2003","unstructured":"Tan C, Yi X, Siew C (2003) On the n-th order shift register based discrete logarithm. IEICE Trans Fundam E86-A: 1213\u20131216","journal-title":"IEICE Trans Fundam"},{"key":"273_CR28","doi-asserted-by":"crossref","unstructured":"Tran T (2009) Protecting buying agents in e-marketplaces by direct experience trust modelling. J Knowl Inf Syst (OnlineFirst, Jan 2009)","DOI":"10.1007\/s10115-008-0188-5"},{"key":"273_CR29","doi-asserted-by":"crossref","unstructured":"Wu Q, Susilo W, Mu Y, Zhang F (2006) Efficient partially blind signatures with provable security. In: Gavrilova M et\u00a0al (eds) ICCSA 2006, LNCS 3982, pp 345\u2013354","DOI":"10.1007\/11751595_38"},{"key":"273_CR30","doi-asserted-by":"crossref","unstructured":"Zhang F, Safavi-Naini R, Susilo W (2003) Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: Cryptology-INDOCRYPT 2003, LNCS 2904, pp 191\u2013204","DOI":"10.1007\/978-3-540-24582-7_14"},{"issue":"2","key":"273_CR31","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s10115-007-0119-x","volume":"17","author":"Y Zhuang","year":"2008","unstructured":"Zhuang Y, Fong S, Shi M (2008) Knowledge-empowered automated negotiation system for e-Commerce. J Knowl Inf Syst 17(2): 167\u2013191","journal-title":"J Knowl Inf Syst"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-009-0273-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-009-0273-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-009-0273-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T06:10:21Z","timestamp":1559110221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-009-0273-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,8]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["273"],"URL":"https:\/\/doi.org\/10.1007\/s10115-009-0273-4","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,8]]}}}