{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:42:38Z","timestamp":1771483358297,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,10]],"date-time":"2013-04-10T00:00:00Z","timestamp":1365552000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s10586-013-0255-x","type":"journal-article","created":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T17:58:53Z","timestamp":1365530333000},"page":"817-827","source":"Crossref","is-referenced-by-count":12,"title":["A systematic method to design strong designated verifier signature without random oracles"],"prefix":"10.1007","volume":"16","author":[{"given":"Haibo","family":"Tian","sequence":"first","affiliation":[]},{"given":"Zhengtao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baodian","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,10]]},"reference":[{"key":"255_CR1","unstructured":"Asaar, M., Salmasizadeh, M.: A pairing based strong designated verifier signature scheme without random oracles. Cryptology ePrint Archive: Report 2012\/061 (2012)"},{"key":"255_CR2","series-title":"LNCS","first-page":"229","volume-title":"PKC\u201905","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational Diffie-Hellman. In: PKC\u201905. LNCS, vol. 3958, pp. 229\u2013240. Springer, Berlin (2005)"},{"key":"255_CR3","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.jss.2008.09.001","volume":"82","author":"F. Cao","year":"2009","unstructured":"Cao, F., Cao, Z.: An identity based universal designated verifier signature scheme secure in the standard model. J. Syst. Softw. 82, 643\u2013649 (2009)","journal-title":"J. Syst. Softw."},{"key":"255_CR4","series-title":"LNCS","first-page":"174","volume-title":"CRYPTO\u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y. (ed.) CRYPTO\u201994, Santa Barbara, California. LNCS, vol. 839, pp. 174\u2013187. Springer, Berlin (1994)"},{"key":"255_CR5","series-title":"LNCS","first-page":"13","volume-title":"CRYPTO\u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public-key encryptosystem provable secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO\u201998, Santa Barbara, California. LNCS, vol. 1462, pp. 13\u201325. Springer, Berlin (1998)"},{"key":"255_CR6","unstructured":"Huang, Q., Yang, G., Wong, D., Susilo, W.: Efficient strong designated verifier signature schemes without random oracles or delegatability. Cryptology ePrint Archive: Report 2009\/518 (2009)"},{"key":"255_CR7","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"EUROCRYPT \u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT \u201996, Saragossa, Spain, May 1996. LNCS, vol. 1070, pp. 143\u2013154. Springer, Berlin (1996)"},{"key":"255_CR8","unstructured":"Kang, L., Tang, X., Lu, X., Fan, J.: A short signature scheme in the standard model. Cryptology ePrint Archive: Report 2007\/398 (2007)"},{"key":"255_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/11832072_5","volume-title":"Security and Cryptography for Networks","author":"F. Laguillaumie","year":"2006","unstructured":"Laguillaumie, F., Libert, B., Quisquater, J.: Universal designated verifier signatures without random oracles or non-black box assumptions. In: Security and Cryptography for Networks. LNCS, vol. 4116, pp. 63\u201377. Springer, Berlin (2006)"},{"key":"255_CR10","series-title":"LNCS","first-page":"105","volume-title":"SCN 2004","author":"F. Laguillaumie","year":"2005","unstructured":"Laguillaumie, F., Vergnaud, D.: Designated verifiers signature: anonymity and efficient construction from any bilinear map. In: Blundo, C., Cimato, S. (eds.) SCN 2004, Amalfi, Italy, September 2005. LNCS, vol. 3352, pp. 105\u2013119. Springer, Berlin (2005)"},{"key":"255_CR11","volume-title":"Modern Cryptography: Theory and Practice, Chap. 10","author":"W. Mao","year":"2003","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice, Chap. 10. Prentice Hall, New York (2003)"},{"key":"255_CR12","series-title":"LNCS","first-page":"165","volume-title":"SAC 2001","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A. (eds.) SAC 2001, Toronto, Canada. LNCS, vol. 2259, pp. 165\u2013180. Springer, Berlin (2001)"},{"key":"255_CR13","series-title":"LNCS","first-page":"86","volume-title":"PKC\u201904","author":"R. Steinfeld","year":"2004","unstructured":"Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard Schnorr\/RSA signatures into universal designated-verifier signatures. In: PKC\u201904. LNCS, vol. 2947, pp. 86\u2013100. Springer, Berlin (2004)"},{"key":"255_CR14","series-title":"LNCS","first-page":"40","volume-title":"ICISC 2003","author":"S. Saeednia","year":"2004","unstructured":"Saeednia, S., Kramer, S., Markovitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J., Lee, D. (eds.) ICISC 2003, Seoul, Korea, November 2004. LNCS, vol. 2971, pp. 40\u201354. Springer, Berlin (2004)"},{"issue":"1","key":"255_CR15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11390-007-9013-y","volume":"22","author":"H. Tian","year":"2007","unstructured":"Tian, H., Sun, X., Wang, M.: A new public key encryption scheme. J. Comput. Sci. Technol. 22(1), 95\u2013102 (2007)","journal-title":"J. Comput. Sci. Technol."},{"key":"255_CR16","first-page":"237","volume-title":"INCOS 2012","author":"H. Tian","year":"2012","unstructured":"Tian, H., Jiang, Z., Liu, Y., Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: INCOS 2012, pp. 237\u2013244 (2012)"},{"key":"255_CR17","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/11787006_6","volume-title":"Automata, Languages and Programming","author":"D. Vergnaud","year":"2006","unstructured":"Vergnaud, D.: New extensions of pairing-based signatures into universal designated verifier signatures. In: Automata, Languages and Programming. LNCS, vol.\u00a04052, pp.\u00a058\u201369 (2006)"},{"key":"255_CR18","series-title":"LNCS","first-page":"318","volume-title":"Inscrypt 2010","author":"K. Yoneyama","year":"2011","unstructured":"Yoneyama, K., Ushida, M., Ohta, K.: Rigorous security requirements for designated verifier signatures. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol. 6584, pp. 318\u2013335. Springer, Berlin (2011)"},{"key":"255_CR19","series-title":"LNCS","first-page":"483","volume-title":"ACNS\u201905","author":"R. Zhang","year":"2005","unstructured":"Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: ACNS\u201905. LNCS, vol. 3531, pp. 483\u2013498. Springer, Berlin (2005)"},{"key":"255_CR20","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/ISDPE.2007.42","volume-title":"Proc. of First International Symposium on Data, Privacy and E-Commerce","author":"H. Zhang","year":"2007","unstructured":"Zhang, H., Ji, C.: An efficient designated verifier signature scheme without random oracles. In: Proc. of First International Symposium on Data, Privacy and E-Commerce, pp. 338\u2013340. IEEE Press, New York (2007)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0255-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-013-0255-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0255-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:40:16Z","timestamp":1559241616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-013-0255-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,10]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["255"],"URL":"https:\/\/doi.org\/10.1007\/s10586-013-0255-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,10]]}}}