{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:57:22Z","timestamp":1758707842338},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T00:00:00Z","timestamp":1357257600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s10207-012-0184-3","type":"journal-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T09:59:25Z","timestamp":1357207165000},"page":"19-31","source":"Crossref","is-referenced-by-count":14,"title":["Double-trapdoor anonymous tags for traceable signatures"],"prefix":"10.1007","volume":"12","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]},{"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Kristiyan","family":"Haralambiev","sequence":"additional","affiliation":[]},{"given":"Miyako","family":"Ohkubo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,4]]},"reference":[{"key":"184_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Warinschi, B.: On the minimal assumptions of group signature schemes. In: ICICS \u201904, LNCS 3269, pp. 1\u201313 (2004)","DOI":"10.1007\/978-3-540-30191-2_1"},{"key":"184_CR2","doi-asserted-by":"crossref","unstructured":"Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: CRYPTO \u201910, LNCS 6223, pp. 209\u2013237 (2010)","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"184_CR3","unstructured":"Abe, M., Haralambiev, K., Ohkubo, M.: Signing on Group Elements for Modular Protocol Designs. Cryptology ePrint Archive, Report 2010\/133 (2010)"},{"key":"184_CR4","doi-asserted-by":"crossref","unstructured":"Bichsel, P., Camenisch, J., Neven, G., Smart, N.P., Warinschi, B.: Get shorty via group signatures without encryption. In: SCN \u201910, LNCS 6280, pp. 381\u2013398 (2010)","DOI":"10.1007\/978-3-642-15317-4_24"},{"key":"184_CR5","doi-asserted-by":"crossref","unstructured":"Blazy, O., Pointcheval, D.: Traceable signature with stepping capabilities. In: Cryptography and Security: From Theory to Applications, LNCS 6805, pp. 108\u2013131 (2012)","DOI":"10.1007\/978-3-642-28368-0_10"},{"issue":"2","key":"184_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D Boneh","year":"2008","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149\u2013177 (2008)","journal-title":"J. Cryptol."},{"key":"184_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Crypto \u201904, LNCS 3152, pp. 41\u201355 (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"184_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: CCS \u201904, pp. 168\u2013177 (2004)","DOI":"10.1145\/1030083.1030106"},{"key":"184_CR9","doi-asserted-by":"crossref","unstructured":"Boyen, X.: The uber-assumption family: a unified complexity framework for bilinear groups. In: Pairing \u201908, LNCS 5209, pp. 39\u201356 (2010)","DOI":"10.1007\/978-3-540-85538-5_3"},{"key":"184_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Eurocrypt \u201991, LNCS 547, pp. 257\u2013265 (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"184_CR11","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M.: Real traceable signatures. In: SAC \u201909, LNCS 5867, pp. 92\u2013107 (2009)","DOI":"10.1007\/978-3-642-05445-7_6"},{"key":"184_CR12","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Chu, C.K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Cryptography and Security: from Theory to Applications, LNCS 6805, pp. 442\u2013464 (2012)","DOI":"10.1007\/978-3-642-28368-0_28"},{"key":"184_CR13","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., He, Y.J., Hui, L.C.K., Yiu, S.M.: SPICE\u2014simple privacy-preserving identity-management for cloud environment. In: ACNS \u201912, LNCS 7341, pp. 526\u2013543 (2012)","DOI":"10.1007\/978-3-642-31284-7_31"},{"key":"184_CR14","doi-asserted-by":"crossref","unstructured":"Groth, J.: Fully anonymous group signatures without random oracles. In: Asiacrypt \u201907, LNCS 4833, pp. 164\u2013180 (2007)","DOI":"10.1007\/978-3-540-76900-2_10"},{"key":"184_CR15","doi-asserted-by":"crossref","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Eurocrypt \u201908, LNCS 4965, pp. 415\u2013432 (2008)","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"184_CR16","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Eurocrypt \u201904, LNCS 3027, pp. 571\u2013589 (2004)","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"184_CR17","doi-asserted-by":"crossref","unstructured":"Libert, B., Yung, M.: Efficient traceable signatures in the standard model. In: Pairing \u201909, LNCS 5671, pp. 187\u2013205 (2009)","DOI":"10.1007\/978-3-642-03298-1_13"},{"key":"184_CR18","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC \u201990, pp. 427\u2013437 (1990)","DOI":"10.1145\/100216.100273"},{"key":"184_CR19","doi-asserted-by":"crossref","unstructured":"Sakai, Y., Schuldt, J.C.N., Emura, K., Hanaoka, G., Ohta, K.: On the security of dynamic group signatures: preventing signature-hijacking. In: PKC \u201912, LNCS 7293, pp. 715\u2013732 (2012)","DOI":"10.1007\/978-3-642-30057-8_42"},{"key":"184_CR20","doi-asserted-by":"crossref","unstructured":"Santis, A.D., Persiano, G.: Zero-knowledge proofs of knowledge without interaction (extended abstract). pp. 427\u2013436. IEEE (1992)","DOI":"10.1007\/3-540-55210-3_204"},{"key":"184_CR21","doi-asserted-by":"crossref","unstructured":"Schuldt, J.C.N., Matsuura, K.: An efficient convertible undeniable signature scheme with delegatable verification. In: ISPEC \u201910, LNCS 6047, pp. 276\u2013293 (2010)","DOI":"10.1007\/978-3-642-12827-1_21"},{"key":"184_CR22","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Eurocrypt \u201997, LNCS 1233, pp. 256\u2013266 (1997)","DOI":"10.1007\/3-540-69053-0_18"},{"key":"184_CR23","doi-asserted-by":"crossref","unstructured":"Yu, K.Y., Yuen, T.H., Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: PE(AR) $$^2$$ : privacy-enhanced anonymous authentication with reputation and revocation. In: ESORICS \u201912, LNCS 7459, pp. 679\u2013696 (2012)","DOI":"10.1007\/978-3-642-33167-1_39"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0184-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-012-0184-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0184-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T17:48:02Z","timestamp":1562521682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-012-0184-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,4]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["184"],"URL":"https:\/\/doi.org\/10.1007\/s10207-012-0184-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,4]]}}}