{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:42:44Z","timestamp":1777372964466,"version":"3.51.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"S4","license":[{"start":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T00:00:00Z","timestamp":1501632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007219","name":"Shanghai Natural Science Foundation","doi-asserted-by":"crossref","award":["14ZR1431000"],"award-info":[{"award-number":["14ZR1431000"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672355"],"award-info":[{"award-number":["61672355"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai technology absorption and innovation project","award":["JJ-YJCX-01-15-5250"],"award-info":[{"award-number":["JJ-YJCX-01-15-5250"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10586-017-1074-2","type":"journal-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T13:52:10Z","timestamp":1501681930000},"page":"10075-10084","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Universally composable secure proxy re-signature scheme with effective calculation"],"prefix":"10.1007","volume":"22","author":[{"given":"Xuan","family":"Hong","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"1074_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT1998. LNCS 1403, pp. 127\u2013144, (1998)","DOI":"10.1007\/BFb0054122"},{"key":"1074_CR2","volume-title":"Atomic Proxy Cryptography, Technical Reports","author":"M Blaze","year":"1997","unstructured":"Blaze, M., Strauss, M.: Atomic Proxy Cryptography, Technical Reports. AT&T Research, Austin (1997)"},{"key":"1074_CR3","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Network and distributed system security symposium, pp. 29\u201343, (2005)"},{"key":"1074_CR4","unstructured":"Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: ACM CCS 2005, pp. 310\u2013319, (2005)"},{"key":"1074_CR5","doi-asserted-by":"crossref","unstructured":"Taban, G., Cardenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: ACMDRM 2006, pp. 69\u201378, (2006)","DOI":"10.1145\/1179509.1179524"},{"key":"1074_CR6","unstructured":"Dodis, Y., Ivan, A.: Proxy cryptography revisited. In: Network and distributed system security symposium, February (2003)"},{"key":"1074_CR7","unstructured":"Shao, J., Chao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random oracles. In: Indocrypt 2007, LNCS 4859, pp. 197\u2013209, (2007)"},{"issue":"1","key":"1074_CR8","first-page":"8","volume":"9","author":"K Kim","year":"2009","unstructured":"Kim, K., Yie, I., Lim, S.: Remark on Shao et al\u2019s bidirectional proxy re-signature scheme in Indocrypt\u201907. Int. J. Netw. Secur. 9(1), 8\u201311 (2009)","journal-title":"Int. J. Netw. Secur."},{"key":"1074_CR9","doi-asserted-by":"crossref","unstructured":"Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Proceedings of the 15th ACM conference on computer and communications security, (2008)","DOI":"10.1145\/1455770.1455835"},{"key":"1074_CR10","unstructured":"Chow, S., Phan, R.: Proxy re-signatures in the standard model. In: ISC 2008, LNCS 5222, pp. 260\u2013276, (2008)"},{"key":"1074_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L., Chen, X., Sun, Y., Du, X.: A new certificate less proxy re-signature scheme in the standard model. In: 2014 Seventh international symposium on computational intelligence and design, pp. 202\u2013206, (2014)","DOI":"10.1109\/ISCID.2014.250"},{"key":"1074_CR12","doi-asserted-by":"crossref","unstructured":"Hu, X., Liu, Y., Xu, H., Wang, J., Zhang, X.: Analysis and improvement of certificateless signature and proxy re-signature schemes. In: IEEE advanced information technology. Electronic and automation control conference (IAEAC) 2015, pp. 166\u2013170, (2015)","DOI":"10.1109\/IAEAC.2015.7428540"},{"key":"1074_CR13","unstructured":"Wang X.: Proxy re-signature supporting conditional delegation. In: 10th international conference on P2P, parallel, grid, cloud and internet computing, pp. 844-848, (2015)"},{"key":"1074_CR14","unstructured":"Vivek, S., Balasubramanian, G.: Controlled proxy re-signing-conditional proxy re-signatures. In: International conference on security & cryptography, (2015)"},{"key":"1074_CR15","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42th IEEE symposium on foundations of computer science, pp. 136\u2013158, (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"1074_CR16","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS 2007, pp. 185\u2013194, (2007)","DOI":"10.1145\/1315245.1315269"},{"key":"1074_CR17","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pogaway, P.: Random oracles are practical: a paradigm from designing efficient protocols. In: ACM 1993, November, (1993)","DOI":"10.1145\/168588.168596"},{"key":"1074_CR18","unstructured":"Backes, M., Hofheinz, D.: How to break and repair a universally composable signature fucntionality. In: ISC 2004, LNCS 3225, pp. 61\u201372, (2004)"},{"key":"1074_CR19","doi-asserted-by":"crossref","unstructured":"Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumption. In: FoCS 2004, pp. 186\u2013195, (2004)","DOI":"10.1109\/FOCS.2004.71"},{"key":"1074_CR20","doi-asserted-by":"publisher","unstructured":"Ye, J., Zhou, X., Xu, Z., Ding, Y.: Verifiable outsourcing of high-degree polynomials and its application in keyword search. Intell. Autom. Soft Comput. doi: 10.1080\/10798587.2016.1267239","DOI":"10.1080\/10798587.2016.1267239"},{"key":"1074_CR21","unstructured":"Canetti, R.: Universally composable signature, certification, and authentication. In: Proceedings of the 17th computer security foundations workshop (CSFW), (2004)"},{"key":"1074_CR22","doi-asserted-by":"publisher","unstructured":"Ding, Y., Xu, Z., Ye, J., Choo, K.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. doi: 10.1016\/j.jcss.2016.11.005","DOI":"10.1016\/j.jcss.2016.11.005"},{"key":"1074_CR23","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"1074_CR24","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identitiy-based encryption from the weil pairing. SIAM J. Comput. 32, 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"1074_CR25","doi-asserted-by":"crossref","unstructured":"Boneh, D., Shacham, H., Lynn, B.: Short signature from the Weil pairing. Asiacrypt 2001. 514\u2013532 (2001)","DOI":"10.1007\/3-540-45682-1_30"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1074-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1074-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1074-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:04:28Z","timestamp":1750795468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1074-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,2]]},"references-count":25,"journal-issue":{"issue":"S4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1074"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1074-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,2]]},"assertion":[{"value":"26 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}