{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:42:54Z","timestamp":1771483374500,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T00:00:00Z","timestamp":1175731200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s10207-007-0021-2","type":"journal-article","created":{"date-parts":[[2007,4,4]],"date-time":"2007-04-04T02:24:43Z","timestamp":1175653483000},"page":"171-183","source":"Crossref","is-referenced-by-count":31,"title":["Secure universal designated verifier signature without random oracles"],"prefix":"10.1007","volume":"7","author":[{"given":"Xinyi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,4,5]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332, pp. 83-107. Springer, Berlin (2002)","DOI":"10.1007\/3-540-46035-7_6"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). ASIACRYPT 2005. Lecture Notes in Computer Science, vol. 3788, pp. 644\u2013661. Springer, Berlin (2005)","DOI":"10.1007\/11593447_35"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. TCC 2006. Lecture Notes in Computer Science, vol. 3876, pp. 60\u201379. Springer, Berlin (2006)","DOI":"10.1007\/11681878_4"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 56\u201373. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. ASIACRYPT 2001. Lecture Notes in Computer Science, vol. 2248, pp. 514\u2013532. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Cheon, J.H.: Security analysis of the strong diffie-hellman problem. EUROCRYPT (2006, to appear)","DOI":"10.1007\/11761679_1"},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie W. and Hellman M. (1976). New directions in cryptography. IEEE IT 22: 644\u2013654","journal-title":"IEEE IT"},{"issue":"2","key":"21_CR8","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser S., Micali S. and Rivest R. (1988). A Digital signature scheme secure against adaptively chosen message attacks. SIAM J. Comput 17(2): 281\u2013308","journal-title":"SIAM J. Comput"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. EUROCRYPT 1996. Lecture Notes in Computer Science, vol. 1070, pp. 143\u2013154. Springer, Berlin (1996)","DOI":"10.1007\/3-540-68339-9_13"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: attacks, new securitynotions and a new construction. In: The 32nd International Colloquium on Automata, Languages and Programming ICALP 2005. Lecture Notes in Computer Science, vol. 3580, pp. 59\u2013471. Springer, Berlin (2004)","DOI":"10.1007\/11523468_38"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 523\u2013543. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard schnorr\/RSA Signatures into universal designated-verifier signatures. PKC 2004. Lecture Notes in Computer Science, vol. 2947, pp. 86\u2013100. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24632-9_7"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Saeednia, S., Kramer, S., Markovitch, O.: An efficient strong designated verifier signature scheme. In: The 6th International Conference on Information Security and Cryptology (ICISC 2003). Lecture Notes in Computer Science, vol. 2971, pp. 40\u201354. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-24691-6_4"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp.114\u2013127. Springer, Berlin (2005)","DOI":"10.1007\/11426639_7"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. Applied Cryptography and Network Security (ACNS 2005). Lecture Notes in Computer Science, vol. 3531, pp. 483\u2013498. Springer, Berlin (2005)","DOI":"10.1007\/11496137_33"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, F., Susilo, W., Mu, Y., Chen, X.: Identity-Based universal designated verifier signatures. In: The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005). Lecture Notes in Computer Science, vol. 3823, pp. 825\u2013834. Springer, Berlin (2005)","DOI":"10.1007\/11596042_85"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0021-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-007-0021-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0021-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:22Z","timestamp":1559113282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-007-0021-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4,5]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["21"],"URL":"https:\/\/doi.org\/10.1007\/s10207-007-0021-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,4,5]]}}}