{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:38:47Z","timestamp":1757587127664},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4658-5","type":"journal-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T06:26:15Z","timestamp":1504247175000},"page":"3017-3030","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications"],"prefix":"10.1007","volume":"97","author":[{"given":"Jiannan","family":"Wei","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,1]]},"reference":[{"key":"4658_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: new definitions, algorithms, and applications. In Proceedings of the 12th ACM conference on Computer and communications security, pp. 310\u2013319. ACM.","DOI":"10.1145\/1102120.1102161"},{"key":"4658_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications security, pp. 62\u201373. ACM.","DOI":"10.1145\/168588.168596"},{"key":"4658_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Advances in Cryptology - EUROCRYPT\u201998, pp. 127\u2013144. Springer.","DOI":"10.1007\/BFb0054122"},{"key":"4658_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in Cryptology - ASIACRYPT 2001, pp. 514\u2013532. Springer.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"4658_CR5","doi-asserted-by":"crossref","unstructured":"Chow, S. S., & Phan, R. C. W. (2008). Proxy re-signatures in the standard model. In Information Security Conference, pp. 260\u2013276. Springer","DOI":"10.1007\/978-3-540-85886-7_18"},{"key":"4658_CR6","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., & Mao, W. (2003). Invisibility and anonymity of undeniable and confirmer signatures. In Topics in Cryptology - CT-RSA 2003, pp. 80\u201397. Springer.","DOI":"10.1007\/3-540-36563-X_6"},{"issue":"6","key":"4658_CR7","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10207-011-0146-1","volume":"10","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. International Journal of Information Security, 10(6), 373\u2013385.","journal-title":"International Journal of Information Security"},{"issue":"1","key":"4658_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jss.2010.08.057","volume":"84","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Identity-based strong designated verifier signature revisited. Journal of Systems and Software, 84(1), 120\u2013129.","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"4658_CR9","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10207-007-0021-2","volume":"7","author":"X Huang","year":"2008","unstructured":"Huang, X., Susilo, W., Mu, Y., & Wu, W. (2008). Secure universal designated verifier signature without random oracles. International Journal of Information Security, 7(3), 171\u2013183.","journal-title":"International Journal of Information Security"},{"key":"4658_CR10","doi-asserted-by":"crossref","unstructured":"Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2006). Short (identity-based) strong designated verifier signature schemes. In Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, Lecture Notes in Computer Science, vol. 3903, pp. 214\u2013225. Springer.","DOI":"10.1007\/11689522_20"},{"issue":"1","key":"4658_CR11","first-page":"82","volume":"6","author":"X Huang","year":"2008","unstructured":"Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2008). Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 6(1), 82\u201393.","journal-title":"International Journal of Network Security"},{"key":"4658_CR12","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., & Impagliazzo, R. (1996). Designated verifier proofs and their applications. In Advances in Cryptology - EUROCRYPT, pp. 143\u2013154. Springer.","DOI":"10.1007\/3-540-68339-9_13"},{"issue":"1","key":"4658_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.compeleceng.2008.05.004","volume":"35","author":"B Kang","year":"2009","unstructured":"Kang, B., Boyd, C., & Dawson, E. (2009). Identity-based strong designated verifier signature schemes: attacks and new construction. Computers & Electrical Engineering, 35(1), 49\u201353.","journal-title":"Computers & Electrical Engineering"},{"key":"4658_CR14","unstructured":"Laguillaumie, F., & Vergnaud, D. (2004). Designated verifier signatures: anonymity and efficient construction from any bilinear map. In 4th International Conference on Security in Communication Networks, pp. 105\u2013119. Springer."},{"key":"4658_CR15","doi-asserted-by":"crossref","unstructured":"Laguillaumie, F., & Vergnaud, D. (2004). Multi-designated verifiers signatures. In International Conference on Information and Communications Security, pp. 495\u2013507.","DOI":"10.1007\/978-3-540-30191-2_38"},{"key":"4658_CR16","doi-asserted-by":"crossref","unstructured":"Libert, B., & Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In Proceedings of the 15th ACM conference on Computer and communications security, pp. 511\u2013520. ACM.","DOI":"10.1145\/1455770.1455835"},{"key":"4658_CR17","doi-asserted-by":"crossref","unstructured":"Shao, J., Cao, Z., Wang, L., & Liang, X. (2007). Proxy re-signature schemes without random oracles. In Progress in Cryptology - INDOCRYPT 2007, pp. 197\u2013209. Springer.","DOI":"10.1007\/978-3-540-77026-8_15"},{"key":"4658_CR18","doi-asserted-by":"crossref","unstructured":"Shao, J., Feng, M., Zhu, B., Cao, Z., & Liu, P. (2010). The security model of unidirectional proxy re-signature with private re-signature key. In Australasian Conference on Information Security and Privacy, pp. 216\u2013232. Springer.","DOI":"10.1007\/978-3-642-14081-5_14"},{"key":"4658_CR19","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J. (2003). Universal designated-verifier signatures. In Advances in Cryptology - Asiacrypt 2003, pp. 523\u2013542. Springer.","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"4658_CR20","doi-asserted-by":"crossref","unstructured":"Susilo, W., Zhang, F., & Mu, Y. (2004). Identity-based strong designated verifier signature schemes. In Australasian Conference on Information Security and Privacy, pp. 313\u2013324. Springer.","DOI":"10.1007\/978-3-540-27800-9_27"},{"key":"4658_CR21","doi-asserted-by":"crossref","unstructured":"Vergnaud, D. (2006). New extensions of pairing-based signatures into universal designated verifier signatures. In ICALP, pp. 58\u201369.","DOI":"10.1007\/11787006_6"},{"key":"4658_CR22","doi-asserted-by":"crossref","unstructured":"Waters, B. (2005). Efficient identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT, pp. 114\u2013127.","DOI":"10.1007\/11426639_7"},{"key":"4658_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, R., Furukawa, J., & Imai, H. (2005). Short signature and universal designated verifier signature without random oracles. In Applied Cryptography and Network Security, pp. 483\u2013498.","DOI":"10.1007\/11496137_33"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4658-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4658-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4658-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T01:15:21Z","timestamp":1570065321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4658-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4658"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4658-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,1]]},"assertion":[{"value":"1 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}