{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:26:23Z","timestamp":1767846383121,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T00:00:00Z","timestamp":1491955200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10207-017-0372-2","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T04:42:21Z","timestamp":1491972141000},"page":"347-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management"],"prefix":"10.1007","volume":"17","author":[{"given":"Yujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"HweeHwa","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,12]]},"reference":[{"key":"372_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 7\u201317. CCS\u201997, ACM, New York, NY, USA (1997)","DOI":"10.1145\/266420.266426"},{"key":"372_CR2","volume-title":"Advances in Cryptology-EUROCRYPT\u201998. LNCS","author":"N Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. In: Nyberg, K. (ed.) Advances in Cryptology-EUROCRYPT\u201998. LNCS, vol. 1403. Springer, Heidelberg (1998)"},{"key":"372_CR3","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security-ESORICS 2005, LNCS","author":"G Ateniese","year":"2005","unstructured":"Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Anitizable signatures. In: di Vimercati, S., Syverson, P., Gollmann, D. (eds.) Computer Security-ESORICS 2005, LNCS, vol. 3679, pp. 159\u2013177. Springer, Heidelberg (2005)"},{"key":"372_CR4","unstructured":"Bao, F., Deng, R.H., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: 1998 IEEE Symposium on Security and Privacy, 1998, Proceedings, pp. 77\u201385 (1998)"},{"key":"372_CR5","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-642-21554-4_12","volume-title":"Applied Cryptography and Network Security, LNCS","author":"F Bao","year":"2011","unstructured":"Bao, F., Deng, R.H., Ding, X., Lai, J., Zhao, Y.: Hierarchical identity-based chameleon hash and its applications. In: Lopez, J., Tsudik, G. (eds.) Applied Cryptography and Network Security, LNCS, vol. 6715, pp. 201\u2013219. Springer, Heidelberg (2011)"},{"key":"372_CR6","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Gentry, C., O\u2019Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 276\u2013285. CCS\u201907, ACM, New York, NY, USA (2007)","DOI":"10.1145\/1315245.1315280"},{"issue":"1","key":"372_CR7","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s00145-010-9082-x","volume":"25","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57\u2013115 (2012)","journal-title":"J. Cryptol."},{"key":"372_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/b11817","volume-title":"Advances in Cryptology-EUROCRYPT 2003. LNCS","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology-EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)"},{"key":"372_CR9","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-642-13708-2_6","volume-title":"Applied Cryptography and Network Security, LNCS","author":"C Brzuska","year":"2010","unstructured":"Brzuska, C., Busch, H., Dagdelen, O., Fischlin, M., Franz, M., Katzenbeisser, S., Manulis, M., Onete, C., Peter, A., Poettering, B., Schr\u00f6der, D.: Redactable signatures for tree-structured data: definitions and constructions. In: Zhou, J., Yung, M. (eds.) Applied Cryptography and Network Security, LNCS, vol. 6123, pp. 87\u2013104. Springer, Heidelberg (2010)"},{"key":"372_CR10","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/978-3-642-00468-1_18","volume-title":"Public Key Cryptography-PKC 2009, LNCS","author":"C Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schr\u00f6der, D., Volk, F.: Security of sanitizable signatures revisited. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography-PKC 2009, LNCS, vol. 5443, pp. 317\u2013336. Springer, Heidelberg (2009)"},{"key":"372_CR11","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1007\/978-3-642-13013-7_26","volume-title":"Public Key Cryptography-PKC 2010, LNCS","author":"C Brzuska","year":"2010","unstructured":"Brzuska, C., Fischlin, M., Lehmann, A., Schr\u00f6der, D.: Unlinkability of sanitizable signatures. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography-PKC 2010, LNCS, vol. 6056, pp. 444\u2013461. Springer, Heidelberg (2010)"},{"key":"372_CR12","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-642-11925-5_13","volume-title":"Topics in Cryptology-CT-RSA 2010, LNCS","author":"S Canard","year":"2010","unstructured":"Canard, S., Jambert, A.: On extended sanitizable signature schemes. In: Pieprzyk, J. (ed.) Topics in Cryptology-CT-RSA 2010, LNCS, vol. 5985, pp. 179\u2013194. Springer, Heidelberg (2010)"},{"key":"372_CR13","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-68914-0_16","volume-title":"Applied Cryptography and Network Security, LNCS","author":"S Canard","year":"2008","unstructured":"Canard, S., Laguillaumie, F., Milhau, M.: Trapdoor sanitizable signatures and their application to content protection. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, LNCS, vol. 5037, pp. 258\u2013276. Springer, Heidelberg (2008)"},{"key":"372_CR14","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-00862-7_9","volume-title":"Topics in Cryptology-CT-RSA 2009, LNCS","author":"EC Chang","year":"2009","unstructured":"Chang, E.C., Lim, C.L., Xu, J.: Short redactable signatures using random trees. In: Fischlin, M. (ed.) Topics in Cryptology-CT-RSA 2009, LNCS, vol. 5473, pp. 133\u2013147. Springer, Heidelberg (2009)"},{"key":"372_CR15","first-page":"201","volume-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation, IFIP Advances in Information and Communication Technology","author":"D Derler","year":"2015","unstructured":"Derler, D., Hanser, C., Slamanig, D.: Blank digital signatures: optimization and practical experiences. In: Camenisch, J., Fischer-H\u00fcbner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation, IFIP Advances in Information and Communication Technology, vol. 457, pp. 201\u2013215. Springer, Berlin (2015)"},{"issue":"4","key":"372_CR16","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10207-013-0194-9","volume":"12","author":"G Draper-Gil","year":"2013","unstructured":"Draper-Gil, G., Zhou, J., Ferrer-Gomila, J.L., Hinarejos, M.F.: An optimistic fair exchange protocol with active intermediaries. Int. J. Inf. Secur. 12(4), 299\u2013318 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"372_CR17","volume-title":"Security and Cryptography for Networks, LNCS","author":"G Fuchsbauer","year":"2008","unstructured":"Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) Security and Cryptography for Networks, LNCS, vol. 5229. Springer, Heidelberg (2008)"},{"key":"372_CR18","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-319-24174-6_8","volume-title":"Computer Security-ESORICS 2015, Part I. LNCS","author":"C Hanser","year":"2015","unstructured":"Hanser, C., Rabkin, M., Schr\u00f6der, D.: Verifiably encrypted signatures: security revisited and a new construction. In: Pernul, G., Yaryan, P., Weippl, E. (eds.) Computer Security-ESORICS 2015, Part I. LNCS, vol. 9326, pp. 146\u2013164. Springer International Publishing, Cham (2015)"},{"key":"372_CR19","doi-asserted-by":"crossref","unstructured":"Hanser, C., Slamanig, D.: Blank digital signatures. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 95\u2013106. ASIA CCS\u201913, ACM, New York, NY, USA (2013)","DOI":"10.1145\/2484313.2484324"},{"issue":"16","key":"372_CR20","doi-asserted-by":"crossref","first-page":"3267","DOI":"10.1016\/j.ins.2011.03.024","volume":"181","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Wong, D.S., Susilo, W.: Group-oriented fair exchange of signatures. Inf. Sci. 181(16), 3267\u20133283 (2011)","journal-title":"Inf. Sci."},{"key":"372_CR21","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.ins.2012.11.022","volume":"228","author":"Q Huang","year":"2013","unstructured":"Huang, Q., Wong, D.S., Susilo, W.: The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228, 222\u2013238 (2013)","journal-title":"Inf. Sci."},{"key":"372_CR22","first-page":"367","volume-title":"CT-RSA 2014, LNCS","author":"Q Huang","year":"2014","unstructured":"Huang, Q., Wong, D.S., Susilo, W.: P $$^2$$ 2 OFE: privacy-preserving optimistic fair exchange of digital signatures. In: Benaloh, J. (ed.) CT-RSA 2014, LNCS, vol. 8366, pp. 367\u2013384. Springer, Heidelberg (2014)"},{"key":"372_CR23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-540-89255-7_6","volume-title":"Advances in Cryptology-ASIACRYPT 2008. LNCS","author":"Q Huang","year":"2008","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Ambiguous optimistic fair exchange. In: Pieprzyk, J. (ed.) Advances in Cryptology-ASIACRYPT 2008. LNCS, vol. 5350, pp. 74\u201389. Springer, Heidelberg (2008)"},{"issue":"1","key":"372_CR24","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10207-011-0152-3","volume":"11","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Secur. 11(1), 53\u201363 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"372_CR25","first-page":"124","volume-title":"PKC 2010. LNCS","author":"X Huang","year":"2010","unstructured":"Huang, X., Mu, Y., Susilo, W., Wu, W., Xiang, Y.: Further observations on optimistic fair exchange protocols in the multi-user setting. In: Nguyen, P., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 124\u2013141. Springer, Heidelberg (2010)"},{"key":"372_CR26","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology-CT-RSA 2002, LNCS","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) Topics in Cryptology-CT-RSA 2002, LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"372_CR27","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology-ASIACRYPT 2010, LNCS","author":"A Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) Advances in Cryptology-ASIACRYPT 2010, LNCS, vol. 6477, pp. 177\u2013194. Springer, Heidelberg (2010)"},{"issue":"4","key":"372_CR28","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10207-014-0226-0","volume":"13","author":"KS Kim","year":"2014","unstructured":"Kim, K.S., Jeong, I.R.: Efficient verifiably encrypted signatures from lattices. Int. J. Inf. Secur. 13(4), 305\u2013314 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"372_CR29","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/11927587_28","volume-title":"Information Security and Cryptology-ICISC 2006, LNCS","author":"M Klonowski","year":"2006","unstructured":"Klonowski, M., Lauks, A.: Extended sanitizable signatures. In: Rhee, M.S., Lee, B. (eds.) Information Security and Cryptology-ICISC 2006, LNCS, vol. 4296, pp. 343\u2013355. Springer, Heidelberg (2006)"},{"key":"372_CR30","doi-asserted-by":"crossref","unstructured":"Kundu, A., Atallah, M.J., Bertino, E.: Leakage-free redactable signatures. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 307\u2013316. CODASPY\u201912, ACM, New York, NY, USA (2012)","DOI":"10.1145\/2133601.2133639"},{"issue":"1","key":"372_CR31","doi-asserted-by":"crossref","first-page":"138","DOI":"10.14778\/1453856.1453876","volume":"1","author":"A Kundu","year":"2008","unstructured":"Kundu, A., Bertino, E.: Structural signatures for tree data structures. Proc. VLDB Endow. 1(1), 138\u2013150 (2008)","journal-title":"Proc. VLDB Endow."},{"key":"372_CR32","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-642-38033-4_9","volume-title":"Information Security Practice and Experience, LNCS","author":"J Lai","year":"2013","unstructured":"Lai, J., Ding, X., Wu, Y.: Accountable trapdoor sanitizable signatures. In: Deng, R.H., Feng, T. (eds.) Information Security Practice and Experience, LNCS, vol. 7863, pp. 117\u2013131. Springer, Heidelberg (2013)"},{"key":"372_CR33","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-36563-X_5","volume-title":"Topics in Cryptology-CT-RSA 2003, LNCS","author":"JY Lee","year":"2003","unstructured":"Lee, J.Y., Cheon, J.H., Kim, S.: An analysis of proxy signatures: is a secure channel necessary? In: Joye, M. (ed.) Topics in Cryptology-CT-RSA 2003, LNCS, vol. 2612, pp. 68\u201379. Springer, Heidelberg (2003)"},{"issue":"5","key":"372_CR34","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1002\/sec.346","volume":"5","author":"S Lim","year":"2012","unstructured":"Lim, S., Lee, E., Park, C.M.: A short redactable signature scheme using pairing. Secur. Commun. Netw. 5(5), 523\u2013534 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"372_CR35","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology-EUROCRYPT 2004, LNCS, vol. 3027, pp. 74\u201390. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"372_CR36","doi-asserted-by":"crossref","unstructured":"Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology-EUROCRYPT 2004, LNCS, vol. 3027, pp. 306\u2013322. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_19"},{"key":"372_CR37","doi-asserted-by":"crossref","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48\u201357. CCS\u201996, ACM, New York, NY, USA (1996)","DOI":"10.1145\/238168.238185"},{"key":"372_CR38","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-642-36362-7_25","volume-title":"Public-Key Cryptography-PKC 2013. LNCS","author":"R Nishimaki","year":"2013","unstructured":"Nishimaki, R., Xagawa, K.: Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted ves. In: Kurosawa, K., Hanaoka, G. (eds.) Public-Key Cryptography-PKC 2013. LNCS, vol. 7778, pp. 405\u2013422. Springer, Heidelberg (2013)"},{"key":"372_CR39","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/978-3-319-07536-5_27","volume-title":"Applied Cryptography and Network Security. LNCS","author":"HC P\u00f6hls","year":"2014","unstructured":"P\u00f6hls, H.C., Samelin, K.: On updatable redactable signatures. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) Applied Cryptography and Network Security. LNCS, vol. 8479, pp. 457\u2013475. Springer International Publishing, Berlin (2014)"},{"key":"372_CR40","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-642-31909-9_13","volume-title":"Security and Privacy in Communication Networks","author":"L Qu","year":"2012","unstructured":"Qu, L., Wang, G., Mu, Y.: Optimistic fair exchange of ring signatures. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) Security and Privacy in Communication Networks, pp. 227\u2013242. Springer, Heidelberg (2012)"},{"key":"372_CR41","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-540-78440-1_9","volume-title":"Public Key Cryptography-PKC 2008, LNCS","author":"JCN Schuldt","year":"2008","unstructured":"Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) Public Key Cryptography-PKC 2008, LNCS, vol. 4939, pp. 141\u2013161. Springer, Heidelberg (2008)"},{"key":"372_CR42","doi-asserted-by":"crossref","unstructured":"Tan, K.W., Deng, R.H.: Applying sanitizable signature to web-service-enabled business processes: going beyond integrity protection. In: IEEE International Conference on Web Services, 2009. ICWS 2009, pp. 67\u201374 (2009)","DOI":"10.1109\/ICWS.2009.34"},{"key":"372_CR43","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-540-24691-6_23","volume-title":"Information Security and Cryptology-ICISC 2003, LNCS","author":"G Wang","year":"2004","unstructured":"Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security analysis of some proxy signatures. In: Lim, J.I., Lee, D.H. (eds.) Information Security and Cryptology-ICISC 2003, LNCS, vol. 2971, pp. 305\u2013319. Springer, Heidelberg (2004)"},{"key":"372_CR44","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-540-40061-5_32","volume-title":"Advances in Cryptology-ASIACRYPT 2003, LNCS","author":"H Wang","year":"2003","unstructured":"Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.S. (ed.) Advances in Cryptology-ASIACRYPT 2003, LNCS, vol. 2894, pp. 507\u2013522. Springer, Heidelberg (2003)"},{"key":"372_CR45","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/978-3-642-38631-2_31","volume-title":"Network and System Security","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Au, M., Liu, J., Yuen, T., Susilo, W.: Threshold-oriented optimistic fair exchange. In: Lopez, J., Huang, X., Sandhu, R. (eds.) Network and System Security, pp. 424\u2013438. Springer, Heidelberg (2013)"},{"key":"372_CR46","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Liu, J., Mao, J.: Optimistic fair exchange of distributed signatures. In: CSC 2014, pp. 85\u201390. IET (2014)"},{"key":"372_CR47","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/978-3-540-89641-8_6","volume-title":"Cryptology and Network Security, LNCS","author":"TH Yuen","year":"2008","unstructured":"Yuen, T.H., Susilo, W., Liu, J.K., Mu, Y.: Sanitizable signatures revisited. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) Cryptology and Network Security, LNCS, vol. 5339, pp. 80\u201397. Springer, Heidelberg (2008)"},{"key":"372_CR48","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-13708-2_4","volume-title":"Applied Cryptography and Network Security, LNCS","author":"DH Yum","year":"2010","unstructured":"Yum, D.H., Seo, J.W., Lee, P.J.: Trapdoor sanitizable signatures made easy. In: Zhou, J., Yung, M. (eds.) Applied Cryptography and Network Security, LNCS, vol. 6123, pp. 53\u201368. Springer, Heidelberg (2010)"},{"key":"372_CR49","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/978-3-642-04642-1_8","volume-title":"Provable Security, LNCS","author":"L Zhang","year":"2009","unstructured":"Zhang, L., Wu, Q., Qin, B.: Identity-based verifiably encrypted signatures without random oracles. In: Pieprzyk, J., Zhang, F. (eds.) Provable Security, LNCS, vol. 5848, pp. 76\u201389. Springer, Heidelberg (2009)"},{"issue":"8","key":"372_CR50","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1002\/sec.652","volume":"6","author":"L Zhang","year":"2013","unstructured":"Zhang, L., Wu, Q., Qin, B.: Identity-based optimistic fair exchange in the standard model. Secur. Commun. Netw. 6(8), 1010\u20131020 (2013)","journal-title":"Secur. Commun. Netw."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0372-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0372-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0372-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T23:28:08Z","timestamp":1569022088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0372-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,12]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["372"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0372-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,12]]}}}