{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T17:06:45Z","timestamp":1773767205909,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T00:00:00Z","timestamp":1484784000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science and Technology, Taiwan (TW)","award":["103-2221-E-008-083"],"award-info":[{"award-number":["103-2221-E-008-083"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10207-017-0360-6","type":"journal-article","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T20:53:06Z","timestamp":1484859186000},"page":"183-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic reversed accumulator"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9425-7901","authenticated-orcid":false,"given":"Tsung-Min","family":"Kuo","sequence":"first","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Meng-Che","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"360_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Tsudik, G.: Quasi-efficient revocation of group signatures. In: Proceedings of the 7th International Conference on Financial Cryptography\u2014FC\u00a0\u201903, LNCS\u00a02357, pp.\u00a0183\u2013197. Springer (2003)","DOI":"10.1007\/3-540-36504-4_14"},{"key":"360_CR2","doi-asserted-by":"crossref","unstructured":"Au, M.H., Tsang, P.P., Susilo, W., Mu, Y.: Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: Proceedings of the Cryptographers\u2019 Track at the RSA Conference 2009\u2014CT-RSA\u00a0 \u201909, LNCS\u00a05473, pp.\u00a0295\u2013308. Springer (2009)","DOI":"10.1007\/978-3-642-00862-7_20"},{"key":"360_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Advances in Cryptology\u2014EUROCRYPT\u00a0\u201904, LNCS\u00a03027, pp.\u00a056\u201373. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"360_CR4","doi-asserted-by":"crossref","unstructured":"Backes, M., Camenisch, J., Sommer, D.: Anonymous yet accountable access control. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp.\u00a040\u201346 (2005)","DOI":"10.1145\/1102199.1102208"},{"key":"360_CR5","doi-asserted-by":"crossref","unstructured":"Benaloh, J., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology\u2014EUROCRYPT\u00a0\u201993, LNCS\u00a0765, pp. 274\u2013285. Springer (1993)","DOI":"10.1007\/3-540-48285-7_24"},{"key":"360_CR6","unstructured":"Brands, S., Paquin, C.: U-Prove Cryptographic Specification v1.1 (2013). http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=166969"},{"key":"360_CR7","doi-asserted-by":"crossref","unstructured":"Bari\u0107, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Advances in Cryptology\u2014EUROCRYPT\u00a0\u201997, LNCS\u00a01233, pp.\u00a0480\u2013494. Springer (1997)","DOI":"10.1007\/3-540-69053-0_33"},{"key":"360_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch, J.: Efficient and generalized group signatures. In: Advances in Cryptology\u2014EUROCRYPT\u00a0\u201997, LNCS\u00a01233, pp.\u00a0465\u2013479. Springer (1997)","DOI":"10.1007\/3-540-69053-0_32"},{"issue":"1","key":"360_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2133375.2133379","volume":"15","author":"J Camenisch","year":"2012","unstructured":"Camenisch, J., Gro\u00df, T.: Efficient attributes for anonymous credentials. ACM Trans. Inf. Syst. Secur. 15(1), 4 (2012). doi: 10.1145\/2133375.2133379","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"360_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security\u2014CCS\u00a0\u201902, pp.\u00a021\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"key":"360_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography\u2014PKC\u00a0\u201909, LNCS\u00a05443, pp.\u00a0481\u2013500. Springer (2009)","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"360_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201902, LNCS\u00a02442, pp.\u00a061\u201376. Springer (2002)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"360_CR13","doi-asserted-by":"crossref","unstructured":"Chen, L., Pedersen, T.P.: New group signature schemes. In: Advances in Cryptology\u2014EUROCRYPT\u00a0\u201994, LNCS\u00a0950, pp.\u00a0171\u2013181. Springer (1995)","DOI":"10.1007\/BFb0053433"},{"key":"360_CR14","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201997, LNCS\u00a01294, pp.\u00a016\u201330. Springer (1997)","DOI":"10.1007\/BFb0052225"},{"key":"360_CR15","unstructured":"IDEntity MIXer (IDEMIX). http:\/\/www.zurich.ibm.com\/security\/idemix\/"},{"key":"360_CR16","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Lim, J.I., Lee, D.H.: Efficient and secure member deletion in group signature schemes. In: Proceedings of the 3rd International Conference on Information Security and Cryptology\u2014ICISC\u00a0\u201900, LNCS\u00a02015, pp.\u00a0150\u2013161. Springer (2001)","DOI":"10.1007\/3-540-45247-8_12"},{"key":"360_CR17","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security\u2014ACNS\u00a0\u201907, LNCS\u00a04521, pp.\u00a0253\u2013269. Springer (2007)","DOI":"10.1007\/978-3-540-72738-5_17"},{"key":"360_CR18","first-page":"269","volume":"14","author":"A Mashatan","year":"2013","unstructured":"Mashatan, A., Vaudenay, S.: A fully dynamic universal accumulator. Proc. Roman. Acad. 14, 269\u2013285 (2013)","journal-title":"Proc. Roman. Acad."},{"key":"360_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen, L.: Accumulators from bilinear pairings and applications. In: Proceedings of the Cryptographers\u2019 Track at the RSA Conference 2005\u2014CT-RSA\u00a0 \u201905, LNCS\u00a03376, pp.\u00a0275\u2013292. Springer (2005)","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"360_CR20","doi-asserted-by":"crossref","unstructured":"Song, D.X.: Practical forward secure group signature schemes. In: Proceedings of the 8th ACM Conference on Computer and Communications Security\u2014CCS\u00a0\u201901, pp.\u00a0225\u2013234 (2001)","DOI":"10.1145\/501983.502015"},{"key":"360_CR21","doi-asserted-by":"crossref","unstructured":"Sander, T., Ta-Shma, A., Yung, M.: Blind, auditable membership proofs. In: Proceedings of the 4th International Conference on Financial Cryptography\u2014FC\u00a0\u201900, LNCS\u00a01962, pp.\u00a053\u201371. Springer (2001)","DOI":"10.1007\/3-540-45472-1_5"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0360-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T15:41:10Z","timestamp":1568734870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0360-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,19]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0360-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,19]]}}}