{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:51:31Z","timestamp":1742392291202,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Group Major Research Projects of Department of Education of Guizhou Province","award":["KY[2016]026"],"award-info":[{"award-number":["KY[2016]026"]}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Plan Project of Guizhou Province","doi-asserted-by":"crossref","award":["[2019]1434"],"award-info":[{"award-number":["[2019]1434"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11277-020-07747-8","type":"journal-article","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T17:02:27Z","timestamp":1598288547000},"page":"1525-1537","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure Identity-Based Blind Signature Scheme for Online Transactions"],"prefix":"10.1007","volume":"116","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-1062","authenticated-orcid":false,"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]},{"given":"Xiuru","family":"He","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,24]]},"reference":[{"key":"7747_CR1","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume":"1440","author":"D Chaum","year":"1983","unstructured":"Chaum, D. (1983). Blind signatures for untraceable payments. Advances in Cryptology LNCS, 1440, 199\u2013203.","journal-title":"Advances in Cryptology LNCS"},{"key":"7747_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jss.2006.02.046","volume":"80","author":"X Chen","year":"2007","unstructured":"Chen, X., Zhang, F., & Liu, S. (2007). ID-based restrictive partially blind signatures and applications. Journal of Systems and Software, 80, 164\u2013171.","journal-title":"Journal of Systems and Software"},{"key":"7747_CR3","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.csi.2008.09.002","volume":"31","author":"S Chow","year":"2009","unstructured":"Chow, S. (2009). Blind signature and ring signature schemes: rehabilitation and attack. Computer Standards and Interfaces, 31, 707\u2013712.","journal-title":"Computer Standards and Interfaces"},{"key":"7747_CR4","doi-asserted-by":"crossref","unstructured":"Cui, W., & Jia, Q. (2019) Provably secure pairing-free identity-based restrictive partially blind signature scheme. IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, (pp. 1038\u20131042).","DOI":"10.1109\/ITNEC.2019.8729301"},{"issue":"2","key":"7747_CR5","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1590\/0001-3765201420130199","volume":"86","author":"G Dong","year":"2014","unstructured":"Dong, G., Gao, F., Shi, W., & Gong, P. (2014). An efficient certificateless blind signature scheme without bilinear pairing. Annals of the Brazilian Academy of Sciences, 86(2), 1003\u20131011.","journal-title":"Annals of the Brazilian Academy of Sciences"},{"issue":"2","key":"7747_CR6","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1049\/iet-ifs.2017.0342","volume":"12","author":"K Girraj","year":"2018","unstructured":"Girraj, K., & Singh, B. (2018). Efficient identity-based blind message recovery signature scheme from pairings. IET Infomation Security, 12(2), 150\u2013156.","journal-title":"IET Infomation Security"},{"key":"7747_CR7","doi-asserted-by":"crossref","unstructured":"Huang, Z., Chen, K., & Wang, Y. (2005). Efficient identity based signatures and blind signatures. International Conference on Cryptology and Network Security, LNCS, (pp. 120\u2013133, vol. 3810).","DOI":"10.1007\/11599371_11"},{"key":"7747_CR8","first-page":"215","volume":"26","author":"X Hu","year":"2010","unstructured":"Hu, X., & Huang, S. (2010). Secure identity-based blind signature scheme in the standard model. Journal of Information Science and Engineering, 26, 215\u2013230.","journal-title":"Journal of Information Science and Engineering"},{"key":"7747_CR9","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.compeleceng.2011.05.009","volume":"37","author":"D He","year":"2011","unstructured":"He, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering, 37, 444\u2013450.","journal-title":"Computers and Electrical Engineering"},{"issue":"9","key":"7747_CR10","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., & Wu, W. (2016). Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Transactions on Information Forensics and Security, 11(9), 2052\u20132064.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7747_CR11","doi-asserted-by":"crossref","unstructured":"SK Hafizul, I., & Mohammad S, O. (2015). Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Security and Communication Networks, 8, 4319\u20134332.","DOI":"10.1002\/sec.1344"},{"issue":"8","key":"7747_CR12","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1007\/s13369-016-2115-5","volume":"41","author":"I Sk Hafizul","year":"2016","unstructured":"Sk Hafizul, I., Ruhul, A., GP, B., Mohammad S, O., & Muhammad, K. (2016). Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering, 41(8), 3163\u20133176.","journal-title":"Arabian Journal for Science and Engineering"},{"key":"7747_CR13","doi-asserted-by":"publisher","unstructured":"Li, R., Yu, J., Li, G., & Li, D. (2007) A new Identity-based blind signature scheme with batch verifications. International Conference on Multimedia and Ubiquitous Engineering, https:\/\/doi.org\/10.1109\/MUE.2007.35.","DOI":"10.1109\/MUE.2007.35"},{"key":"7747_CR14","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.mcm.2012.07.009","volume":"58","author":"F Li","year":"2013","unstructured":"Li, F., Zhang, M., & Takagi, T. (2013). Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 58, 196\u2013203.","journal-title":"Mathematical and Computer Modelling"},{"key":"7747_CR15","doi-asserted-by":"crossref","unstructured":"Li, Q., Hsu, C., He, D., Choo, K., & Gong, P. (2020). An identity-based blind signature scheme using lattice with provable security. Mathematical Problems in Engineering, vol. 2020, Article ID 7528571:1-12.","DOI":"10.1155\/2020\/7528571"},{"key":"7747_CR16","doi-asserted-by":"crossref","unstructured":"LeTrieu, P., & Wakaha, O. (2009). New identity-based blind signature and blind decryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics Communications and computer Sciences, LNCS, (pp. 1822\u20131835, vol. E92A, no. 8).","DOI":"10.1587\/transfun.E92.A.1822"},{"issue":"10","key":"7747_CR17","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1093\/comjnl\/bxt069","volume":"57","author":"L Lourdes","year":"2014","unstructured":"Lourdes, L., Luis, J., & Francisco, R. (2014). A pairing-based blind signature e-voting scheme. Computer Journal, 57(10), 1460\u20131471.","journal-title":"Computer Journal"},{"issue":"2","key":"7747_CR18","first-page":"106","volume":"11","author":"N Moldovyan","year":"2010","unstructured":"Moldovyan, N. (2010). Blind collective signature scheme based on discrete logarithm problem. International Journal of Network Security, 11(2), 106\u2013113.","journal-title":"International Journal of Network Security"},{"issue":"3","key":"7747_CR19","first-page":"202","volume":"12","author":"N Moldovyan","year":"2011","unstructured":"Moldovyan, N. (2011). Blind signature schemes from digital signature standards. International Journal of Network Security, 12(3), 202\u2013210.","journal-title":"International Journal of Network Security"},{"issue":"5","key":"7747_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.3991\/ijoe.v16i05.13809","volume":"16","author":"T Nedal","year":"2020","unstructured":"Nedal, T., Ashraf, T., Ramzi, A., & Talal, E. (2020). Design of identity-based blind signature scheme upon chaotic maps. International Journal of Online and Biomedical Engineering, 16(5), 104\u2013118.","journal-title":"International Journal of Online and Biomedical Engineering"},{"issue":"4","key":"7747_CR21","doi-asserted-by":"publisher","first-page":"397","DOI":"10.24846\/v19i4y201007","volume":"19","author":"C Popescu","year":"2010","unstructured":"Popescu, C. (2010). Blind signature schemes based on the elliptic curve discrete logarithm problem. Studies in Informatics and Control, 19(4), 397\u2013402.","journal-title":"Studies in Informatics and Control"},{"key":"7747_CR22","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2010","unstructured":"Pointcheval, D., & Stern, J. (2010). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361\u2013396.","journal-title":"Journal of Cryptology"},{"key":"7747_CR23","first-page":"47","volume":"196","author":"A Shamir","year":"1984","unstructured":"Shamir, A. (1984). Identity-based cryptosystem and signature scheme. Advances in Cryptology-Crypto, LNCS, 196, 47\u201353.","journal-title":"Advances in Cryptology-Crypto, LNCS"},{"key":"7747_CR24","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume":"921","author":"M Stadler","year":"1995","unstructured":"Stadler, M., Piveteau, J. M., & Camenisch, J. (1995). Fair blind signatures. Advances in Cryptology-Eurocrypt, LNCS, 921, 209\u2013219.","journal-title":"Advances in Cryptology-Eurocrypt, LNCS"},{"issue":"6","key":"7747_CR25","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S Solms","year":"1992","unstructured":"Solms, S., & Naccache, D. (1992). On blind signatures and perfect crimes. Computer and Security, 11(6), 581\u2013583.","journal-title":"Computer and Security"},{"key":"7747_CR26","doi-asserted-by":"publisher","first-page":"105898","DOI":"10.1016\/j.ipl.2019.105898","volume":"155","author":"S Singh","year":"2020","unstructured":"Singh, S., & Padhye, S. (2020). Identity based blind signature scheme over NTRU lattices. Information Processing Letters, 155, 105898.","journal-title":"Information Processing Letters"},{"issue":"6","key":"7747_CR27","first-page":"93","volume":"2","author":"A Tripathy","year":"2010","unstructured":"Tripathy, A., Parta, I., & Jena, D. (2010). Proxy blind signature based on ECDLP. International Journal of Computer and Network Security, 2(6), 93\u201398.","journal-title":"International Journal of Computer and Network Security"},{"issue":"2","key":"7747_CR28","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/10798587.2013.786967","volume":"19","author":"Q Tang","year":"2013","unstructured":"Tang, Q., & Shen, F. (2013). Identity-based Xtr blind signature scheme. Intelligent Automation and Soft Computing, 19(2), 143\u2013149.","journal-title":"Intelligent Automation and Soft Computing"},{"key":"7747_CR29","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1002\/sec.582","volume":"6","author":"Z Tan","year":"2013","unstructured":"Tan, Z. (2013). Efficient pairing-free provably secure identity-based proxy blind signature scheme. Security and Communication Networks, 6, 593\u2013601.","journal-title":"Security and Communication Networks"},{"key":"7747_CR30","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/IAS.2009.257","volume":"2","author":"X Yang","year":"2009","unstructured":"Yang, X., Liang, Z., Wei, P., & Shen, J. (2009). A provably secure certificateless blind signature scheme. Fifth International Conference on Information Assurance and Security, 2, 643\u2013646.","journal-title":"Fifth International Conference on Information Assurance and Security"},{"key":"7747_CR31","first-page":"533","volume":"2501","author":"F Zhang","year":"2002","unstructured":"Zhang, F., & Kim, K. (2002). ID-based blind signature and ring signature from pairings. Advances in Cryptology-ASIACRYPT, LNCS, 2501, 533\u2013547.","journal-title":"Advances in Cryptology-ASIACRYPT, LNCS"},{"key":"7747_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, L., & Ma, Y. (2014). A lattice-based identity-based proxy blind signature scheme in the standard model. Mathematical Problems in Engineering, (pp. 6, vol. 2014), Article ID 307637.","DOI":"10.1155\/2014\/307637"},{"key":"7747_CR33","doi-asserted-by":"crossref","unstructured":"Zhu, H., Tan, Y., Zhu, L., Zhang, Q., & Li, Y. (2018). An efficient identity-based proxy blind signature for semioffline services. Wireless Communications and Mobile Computing, (p. 9), article ID 5401890.","DOI":"10.1155\/2018\/5401890"},{"issue":"5","key":"7747_CR34","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.3390\/s18051663","volume":"18","author":"H Zhu","year":"2018","unstructured":"Zhu, H., Tan, Y., Zhu, L., Wang, X., Zhang, Q., & Li, Y. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1663.","journal-title":"Sensors"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07747-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07747-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07747-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:13:09Z","timestamp":1629763989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07747-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,24]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["7747"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07747-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,8,24]]},"assertion":[{"value":"24 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}