{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:43:35Z","timestamp":1771483415877,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T00:00:00Z","timestamp":1314144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s10207-011-0146-1","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T12:51:11Z","timestamp":1314103871000},"page":"373-385","source":"Crossref","is-referenced-by-count":43,"title":["Efficient strong designated verifier signature schemes without random oracle or with non-delegatability"],"prefix":"10.1007","volume":"10","author":[{"given":"Qiong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"key":"146_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: CT-RSA, vol. 2020 of Lecture Notes in Computer Science, pp. 143\u2013158. Springer (2001)","DOI":"10.1007\/3-540-45353-9_12"},{"key":"146_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Proceedings of Advances in Cryptology\u2014CRYPTO 1992, vol. 740 of Lecture Notes in Computer Science, pp. 390\u2013420. Springer (1992)","DOI":"10.1007\/3-540-48071-4_28"},{"key":"146_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proceedings of Advances in Cryptology\u2014ASIACRYPT 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 531\u2013545. Springer (2000)","DOI":"10.1007\/3-540-44448-3_41"},{"key":"146_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"issue":"3\/4","key":"146_CR5","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1504\/IJSN.2007.013173","volume":"2","author":"R. Bhaskar","year":"2007","unstructured":"Bhaskar R., Herranz J., Laguillaumie F.: Aggregate designated verifier signatures and application to secure routing. Int. J. Secur. Netw. 2(3\/4), 192\u2013201 (2007)","journal-title":"Int. J. Secur. Netw."},{"key":"146_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Proceedings of Advances in Cryptology\u2014EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 56\u201373. Springer (2004a)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"146_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Proceedings of Advances in Cryptology\u2014CRYPTO 2004, vol. 3152 of Lecture Notes in Computer Science, pp. 41\u201355. Springer (2004b)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"146_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004) A preliminary version appeared in Asiacrypt (2001)","DOI":"10.1007\/s00145-004-0314-9"},{"key":"146_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Proceedings of Advances in Cryptology\u2014CRYPTO 1989, vol. 435 of Lecture Notes in Computer Science, pp. 212\u2013216. Springer (1989)","DOI":"10.1007\/0-387-34805-0_20"},{"key":"146_CR10","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical id-based cryptography. In: Proceedings of Advances in Cryptology\u2014ASIACRYPT 2002, vol. 2501 of Lecture Notes in Computer Science, pp. 548\u2013566. Springer (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"146_CR11","unstructured":"Huang, Q., Susilo, W., Wong, D.S. (2009) Non-delegatable identity-based designated verifier signature. Cryptology ePrint Archive, Report 2009\/367"},{"key":"146_CR12","doi-asserted-by":"crossref","unstructured":"Huang, X., Mu, Y., Susilo, W., Wu, W.: Provably secure pairing-based convertible undeniable signature with short signature length. In: Proceedings of 1st International Conference on Pairing-Based Cryptography, Pairing 2007, vol. 4575 of Lecture Notes in Computer Science, pp. 367\u2013391. Springer (2007)","DOI":"10.1007\/978-3-540-73489-5_21"},{"key":"146_CR13","doi-asserted-by":"crossref","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal designated verifier signature without delegatability. In: Proceedings of 8th International Conference on Information and Communications Security, ICICS 2006, vol. 4307 of Lecture Notes in Computer Science, pp. 479\u2013498. Springer (2006)","DOI":"10.1007\/11935308_34"},{"issue":"3","key":"146_CR14","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s10207-007-0021-2","volume":"7","author":"X. Huang","year":"2007","unstructured":"Huang X., Susilo W., Mu Y., Wu W.: Secure universal designated verifier signature without random oracles. Int. J. Inf. Secur. 7(3), 171\u2013183 (2007)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"146_CR15","first-page":"82","volume":"6","author":"X. Huang","year":"2008","unstructured":"Huang X., Susilo W., Mu Y., Zhang F.: Short designated verifier signature scheme and its identity-based variant. Int. J. Netw. Secur. 6(1), 82\u201393 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"146_CR16","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Proceedings of Advances in Cryptology\u2014EUROCRYPT 1996, vol. 1070 of Lecture Notes in Computer Science, pp. 143 \u2013 154. Springer (1996)","DOI":"10.1007\/3-540-68339-9_13"},{"key":"146_CR17","doi-asserted-by":"crossref","unstructured":"Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: ACM Conference on Computer and Communications Security, pp. 155\u2013164. ACM (2003)","DOI":"10.1145\/948109.948132"},{"key":"146_CR18","doi-asserted-by":"crossref","unstructured":"Laguillaumie, F., Libert, B., Quisquater, J.-J.: Universal designated verifier signatures without random oracles or non-black box assumptions. In: Proceedings of 5th International Conference on Security and Cryptography for Networks, SCN 2006, vol. 4116 of Lecture Notes in Computer Science, pp. 63\u201377. Springer (2006)","DOI":"10.1007\/11832072_5"},{"key":"146_CR19","doi-asserted-by":"crossref","unstructured":"Laguillaumie, F., Vergnaud, D.: Designated verifier signatures: anonymity and efficient construction from any bilinear map. In: Proceedings of 4th International Conference on Security in Communication Networks, SCN 2004, vol. 3352 of Lecture Notes in Computer Science, pp. 105\u2013119. Springer (2004a)","DOI":"10.1007\/978-3-540-30598-9_8"},{"key":"146_CR20","doi-asserted-by":"crossref","unstructured":"Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures. In: Proceedings of 6th International Conference on Information and Communications Security, ICICS 2004, vol. 3269 of Lecture Notes in Computer Science, pp. 495\u2013507. Springer (2004b)","DOI":"10.1007\/978-3-540-30191-2_38"},{"key":"146_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Lipmaa, H., Pei, D.: On delegatability of four designated verifier signatures. In: Proceedings of 7th International Conference on Information and Communications Security, ICICS 2005, vol.e 3783 of Lecture Notes in Computer Science, pp. 61\u201371. Springer (2005)","DOI":"10.1007\/11602897_6"},{"key":"146_CR22","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: Attacks, new security notions and a new construction. In: Proceedings of 32th International Colloquium on Automata, Languages and Programming, ICALP 2005, vol. 3580 of Lecture Notes in Computer Science, pp. 459\u2013471. Springer (2005)","DOI":"10.1007\/11523468_38"},{"issue":"2","key":"146_CR23","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/972639.972643","volume":"51","author":"M. Naor","year":"2004","unstructured":"Naor M., Reingold O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231\u2013262 (2004)","journal-title":"J. ACM"},{"issue":"3","key":"146_CR24","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"146_CR25","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd C. (ed.) Proceedings of Advances in Cryptology\u2014ASIACRYPT 2001, vol. 2248 of Lecture Notes in Computer Science, pp. 552\u2013565. Springer (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"146_CR26","doi-asserted-by":"crossref","unstructured":"Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Proceedings of 6th International Conference on Information Security and Cryptology, ICISC 2003, vol. 2971 of Lecture Notes in Computer Science, pp. 40\u201354. Springer (2003)","DOI":"10.1007\/978-3-540-24691-6_4"},{"key":"146_CR27","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T., Wang, X. (eds.) Proceedings of Public Key Cryptography 2007, vol. 4450 of Lecture Notes in Computer Science, pp. 166\u2013180. Springer (2007)","DOI":"10.1007\/978-3-540-71677-8_12"},{"key":"146_CR28","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: Proceedings of Advances in Cryptology\u2014ASIACRYPT 2003 vol. 2894 of Lecture Notes in Computer Science, pp. 523\u2013542. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"146_CR29","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard Schnorr\/RSA signatures into universal designated-verifier signatures. In: Proceedings of Public Key Cryptography 2004, vol. 2947 of Lecture Notes in Computer Science, pp. 86\u2013100. Springer (2004)","DOI":"10.1007\/978-3-540-24632-9_7"},{"key":"146_CR30","doi-asserted-by":"crossref","unstructured":"Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Proceedings of 9th Australasian Conference on Information Security and Privacy, ACISP 2004, vol. 3108 of Lecture Notes in Computer Science, pp. 313\u2013324. Springer (2004)","DOI":"10.1007\/978-3-540-27800-9_27"},{"key":"146_CR31","doi-asserted-by":"crossref","unstructured":"Vergnaud, D.: New extensions of pairing-based signatures into universal designated verifier signatures. In: Proceedings of 33th International Colloquium on Automata, Languages and Programming, ICALP 2006, vol. 4052 of Lecture Notes in Computer Science, pp. 58\u201369. Springer (2006)","DOI":"10.1007\/11787006_6"},{"issue":"6","key":"146_CR32","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.ins.2008.11.011","volume":"179","author":"B. Wang","year":"2009","unstructured":"Wang B., Song Z.: A non-interactive deniable authentication scheme based on designated verifier proofs. Inf. Sci. 179(6), 858\u2013865 (2009)","journal-title":"Inf. Sci."},{"key":"146_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: Proceedings of 3rd International Conference on Applied Cryptography and Network Security, ACNS 2005, vol. 3531 of Lecture Notes in Computer Science, pp. 483\u2013498. Springer (2005)","DOI":"10.1007\/11496137_33"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0146-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-011-0146-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0146-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T04:53:32Z","timestamp":1560488012000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-011-0146-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,24]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["146"],"URL":"https:\/\/doi.org\/10.1007\/s10207-011-0146-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,24]]}}}