{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:38:54Z","timestamp":1718667534166},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,10]],"date-time":"2013-04-10T00:00:00Z","timestamp":1365552000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s10586-013-0254-y","type":"journal-article","created":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T13:59:08Z","timestamp":1365515948000},"page":"807-815","source":"Crossref","is-referenced-by-count":8,"title":["A novel construction of SDVS with secure disavowability"],"prefix":"10.1007","volume":"16","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,10]]},"reference":[{"key":"254_CR1","first-page":"164","volume-title":"FC 2004","author":"G. Ateniese","year":"2004","unstructured":"Ateniese, G., Medeiros, B.: Identity-based chameleon hash and applications. In: FC 2004, pp. 164\u2013180. Springer, Heidelberg (2004)"},{"key":"254_CR2","series-title":"LNCS","first-page":"165","volume-title":"SCN 2004","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Medeiros, B.: On the key exposure problem in chameleon hashes. In: SCN 2004. LNCS, vol. 3352, pp. 165\u2013179. Springer, Berlin (2005)"},{"issue":"4","key":"254_CR3","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.jss.2008.09.001","volume":"82","author":"F. Cao","year":"2009","unstructured":"Cao, F., Cao, Z.: An identity based universal designated verifier signature scheme secure in the standard model. J. Syst. Softw. 82(4), 643\u2013649 (2009)","journal-title":"J. Syst. Softw."},{"key":"254_CR4","series-title":"LNCS","first-page":"458","volume-title":"EUROCRYPT 1990","author":"D. Chaum","year":"1991","unstructured":"Chaum, D.: Zero-knowledge undeniable signatures (extended abstract). In: EUROCRYPT 1990. LNCS, vol. 473, pp. 458\u2013464. Springer, Berlin (1991)"},{"key":"254_CR5","first-page":"212","volume-title":"Proc. on Advances in Cryptology, CRYPTO \u201989","author":"D. Chaum","year":"1989","unstructured":"Chaum, D., Antwerpen, H.: Undeniable signatures. In: Proc. on Advances in Cryptology, CRYPTO \u201989, pp. 212\u2013216. Springer, Heidelberg (1989)"},{"key":"254_CR6","series-title":"LNCS","first-page":"200","volume-title":"ACISP 2010","author":"X. Chen","year":"2010","unstructured":"Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J., Kim, K.: Identity-based chameleon hash scheme without key exposure. In: ACISP 2010. LNCS, vol. 6168, pp. 200\u2013215. Springer, Berlin (2010)"},{"issue":"4","key":"254_CR7","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1016\/j.compeleceng.2011.03.011","volume":"37","author":"X. Chen","year":"2011","unstructured":"Chen, X., Zhang, F., Tian, H., Wei, B., Kim, K.: Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4), 614\u2013623 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"254_CR8","series-title":"LNCS","first-page":"205","volume-title":"EUROCRYPT 1991","author":"Y. Desmedt","year":"1991","unstructured":"Desmedt, Y., Yung, M.: Weaknesses of undeniable signature schemes. In: EUROCRYPT 1991. LNCS, vol. 547, pp. 205\u2013220. Springer, Berlin (1991)"},{"key":"254_CR9","series-title":"LNCS","first-page":"21","volume-title":"CRYPTO 1987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y., Goutier, C., Bengio, S.: Special uses and sbuses of the Fiat-Shamir passport protocol. In: CRYPTO 1987. LNCS, vol. 263, pp. 21\u201339. Springer, Berlin (1988)"},{"issue":"2","key":"254_CR10","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.csi.2007.12.001","volume":"31","author":"W. Gao","year":"2009","unstructured":"Gao, W., Li, F., Wang, X.: Chameleon hash without key exposure based on Schnorr signature. Comput. Stand. Interfaces 31(2), 282\u2013285 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"254_CR11","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/11596042_86","volume-title":"Proc. of Embedded and Ubiquitous Computing EUC 2005 Workshops","author":"X. Huang","year":"2005","unstructured":"Huang, X., Mu, Y., Susilo, W., Zhang, F.: Short designated verifier proxy signature from pairings. In: Proc. of Embedded and Ubiquitous Computing EUC 2005 Workshops. LNCS, vol. 3823, pp. 835\u2013844. Springer, Heidelberg (2005)"},{"key":"254_CR12","series-title":"LNCS","first-page":"479","volume-title":"ICICS06","author":"X. Huang","year":"2006","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal designated verifier signature without delegatability. In: ICICS06. LNCS, vol. 4307, pp. 479\u2013498. Springer, Heidelberg (2006)"},{"issue":"3","key":"254_CR13","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s10207-007-0021-2","volume":"7","author":"X. Huang","year":"2007","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Secure universal designated verifier signature without random oracles. Int. J. Inf. Secur. 7(3), 171\u2013183 (2007)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"254_CR14","first-page":"82","volume":"6","author":"X. Huang","year":"2008","unstructured":"Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short designated verifier signature scheme and its identity-based variant. Int. J. Netw. Secur. 6(1), 82\u201393 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"254_CR15","unstructured":"Huang, Q., Yang, G., Wang, D.S., Susilo, W.: Efficient strong designated verifier signature schemes without random oracles or delegatability, eprint. http:\/\/eprint.iacr.org\/2009\/518.pdf (2009)"},{"key":"254_CR16","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. http:\/\/www.cs.cityu.edu.hk\/~qhuang\/papers\/ibsdvs.pdf (2009)"},{"key":"254_CR17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jss.2010.08.057","volume":"2011","author":"Q. Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong Duncan, S., Susilo, W.: Identity-based strong designated verifier signature revisited. J. Syst. Softw. 2011, 120\u2013129 (2011)","journal-title":"J. Syst. Softw."},{"key":"254_CR18","series-title":"LNCS","first-page":"143","volume-title":"EUROCRYPT\u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: EUROCRYPT\u201996. LNCS, vol. 1070, pp. 143\u2013154. Springer, Heidelberg (1996)"},{"issue":"2","key":"254_CR19","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.jss.2008.06.014","volume":"82","author":"B. Kang","year":"2009","unstructured":"Kang, B., Boyd, C., Dawson, E.: A novel identity based strong designated verifier signature scheme. J. Syst. Softw. 82(2), 270\u2013273 (2009)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"254_CR20","doi-asserted-by":"crossref","first-page":"235","DOI":"10.4218\/etrij.12.0111.0597","volume":"34","author":"J.H. Ki","year":"2012","unstructured":"Ki, J.H., Hwang, J.Y., Nyang, D.H., et al.: Constructing strong identity-based designated verifier signatures with self-unverifiability. ETRI J. 34(2), 235\u2013244 (2012)","journal-title":"ETRI J."},{"key":"254_CR21","first-page":"143","volume-title":"Network and Distributed System Security Symposium","author":"H. Krawczyk","year":"2000","unstructured":"Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. In: Network and Distributed System Security Symposium, pp. 143\u2013154 (2000)"},{"key":"254_CR22","series-title":"LNCS","first-page":"105","volume-title":"SCN 2004","author":"F. Laguillaumie","year":"2004","unstructured":"Laguillaumie, F., Vergnaud, D.: Designated verifier signatures: anonymity and efficient construction from any bilinear map. In: SCN 2004. LNCS, vol. 3352, pp. 105\u2013119. Springer, Heidelberg (2004)"},{"key":"254_CR23","series-title":"LNCS","first-page":"495","volume-title":"ICICS 2004","author":"F. Laguillaumie","year":"2004","unstructured":"Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures. In: ICICS 2004. LNCS, vol. 3269, pp. 495\u2013507. Springer, Heidelberg (2004)"},{"key":"254_CR24","series-title":"LNCS","first-page":"63","volume-title":"SCN 2006","author":"F. Laguillaumie","year":"2006","unstructured":"Laguillaumie, F., Libert, B., Quisquater, J.-J.: Universal designated verifier signatures without random oracles or non-black box assumptions. In: SCN 2006. LNCS, vol. 4116, pp. 63\u201377. Springer, Heidelberg (2006)"},{"key":"254_CR25","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/978-3-540-73549-6_116","volume-title":"Proc. of Ubiquitous Intelligence and Computing 2007","author":"Y. Li","year":"2007","unstructured":"Li, Y., Susilo, W., Mu, Y., Pei, D.Y.: Designated verifier signature: definition, framework and new constructions. In: Proc. of Ubiquitous Intelligence and Computing 2007. LNCS, vol. 4611, pp. 1191\u20131200. Springer, Heidelberg (2007)"},{"key":"254_CR26","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/11523468_38","volume-title":"Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP-05)","author":"H. Lipmaa","year":"2005","unstructured":"Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: attacks, new security notions and a new construction. In: Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP-05). LNCS, vol. 3580, pp. 459\u2013471. Springer, Heidelberg (2005)"},{"issue":"2","key":"254_CR27","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1016\/j.amc.2004.10.070","volume":"169","author":"R. Lu","year":"2005","unstructured":"Lu, R., Cao, Z.: Designated verifier proxy signature scheme with message recovery. Appl. Math. Comput. 169(2), 1237\u20131246 (2005)","journal-title":"Appl. Math. Comput."},{"key":"254_CR28","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"254_CR29","series-title":"LNCS","first-page":"40","volume-title":"ICISC 2003","author":"S. Saeednia","year":"2004","unstructured":"Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: ICISC 2003. LNCS, vol. 2971, pp. 40\u201354. Springer, Heidelberg (2004)"},{"issue":"5","key":"254_CR30","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.csi.2007.08.020","volume":"30","author":"S.-H. Seo","year":"2008","unstructured":"Seo, S.-H., Hwang, J.Y., Choi, K.Y., Lee, D.H.: Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5), 288\u2013295 (2008)","journal-title":"Comput. Stand. Interfaces"},{"key":"254_CR31","series-title":"LNCS","first-page":"313","volume-title":"ACISP 2004","author":"W. Susilo","year":"2004","unstructured":"Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: ACISP 2004. LNCS, vol. 3108, pp. 313\u2013324. Springer, Heidelberg (2004)"},{"key":"254_CR32","series-title":"LNCS","first-page":"58","volume-title":"ICALP 2006","author":"D. Vergnaud","year":"2006","unstructured":"Vergnaud, D.: New extensions of pairing-based signatures into universal designated verifier signatures. In: ICALP 2006. LNCS, vol. 4052, pp. 58\u201369. Springer, Heidelberg (2006)"},{"key":"254_CR33","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.ins.2008.11.011","volume":"2009","author":"B. Wang","year":"2009","unstructured":"Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated verifier proofs. Inf. Sci. 2009, 858\u2013865 (2009)","journal-title":"Inf. Sci."},{"key":"254_CR34","first-page":"286","volume-title":"INCoS","author":"B. Yang","year":"2012","unstructured":"Yang, B., Sun, Y., Yu, Y., Xia, Q.: A strong designated verifier signature scheme with secure disavowability. In: INCoS, pp. 286\u2013291 (2012)"},{"issue":"8","key":"254_CR35","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.1016\/j.camwa.2009.01.032","volume":"57","author":"Y. Yu","year":"2009","unstructured":"Yu, Y., Xu, C., Zhang, X., Liao, Y.: Designated verifier proxy signature scheme without random oracles. Comput. Math. Appl. 57(8), 1352\u20131364 (2009)","journal-title":"Comput. Math. Appl."},{"key":"254_CR36","first-page":"351","volume-title":"NAS08","author":"J. Zhang","year":"2008","unstructured":"Zhang, J., Geng, Q.: On the security of group signature scheme and designated verifier signature scheme. In: NAS08, pp. 351\u2013358. IEEE Press, New York (2008)"},{"issue":"3","key":"254_CR37","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1016\/j.ins.2007.07.005","volume":"178","author":"J. Zhang","year":"2008","unstructured":"Zhang, J., Mao, J.: A novel id-based designated verifier signature scheme. Inf. Sci. 178(3), 766\u2013773 (2008)","journal-title":"Inf. Sci."},{"key":"254_CR38","series-title":"LNCS","first-page":"483","volume-title":"ACNS 2005","author":"R. Zhang","year":"2005","unstructured":"Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: ACNS 2005. LNCS, vol. 3531, pp. 483\u2013498. Springer, Heidelberg (2005)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0254-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-013-0254-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0254-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T14:40:16Z","timestamp":1559227216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-013-0254-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,10]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["254"],"URL":"https:\/\/doi.org\/10.1007\/s10586-013-0254-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,10]]}}}