{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:22:30Z","timestamp":1648840950736},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s11390-007-9008-8","type":"journal-article","created":{"date-parts":[[2007,2,9]],"date-time":"2007-02-09T13:31:12Z","timestamp":1171027872000},"page":"71-74","source":"Crossref","is-referenced-by-count":0,"title":["Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt\u20192004"],"prefix":"10.1007","volume":"22","author":[{"given":"Xin-Yi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Fu-Tai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,14]]},"reference":[{"key":"9008_CR1","doi-asserted-by":"crossref","unstructured":"D Chaum, E van Heyst. Group signatures. In Proc. Advances in Cryptology\u2014Eurocrypt 1991, Lecture Notes in Computer Science 547, Brighton, UK, 1991, pp.257\u2013265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"9008_CR2","doi-asserted-by":"crossref","unstructured":"Camenisch J. Efficient and generalized group signatures. In Proc. Advances in Cryptology\u2014Eurocrypt 1997, Lecture Notes in Computer Science 1233, Konstanz, Germany, 1997, pp.465\u2013479.","DOI":"10.1007\/3-540-69053-0_32"},{"key":"9008_CR3","doi-asserted-by":"crossref","unstructured":"Chen L, Pedersen T P. New group signature schemes. In Proc. Advances in Cryptology\u2014Eurocrypt 1994, Lecture Notes in Computer Science 950, Perugia, italy, 1994, pp.171\u2013181.","DOI":"10.1007\/BFb0053433"},{"key":"9008_CR4","doi-asserted-by":"crossref","unstructured":"Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Proc. Advances in Cryptology\u2014Crypto 1997, Lecture Notes in Computer Science 1294, Santa Barbara, California, USA, 1997, pp.410\u2013424.","DOI":"10.1007\/BFb0052252"},{"key":"9008_CR5","doi-asserted-by":"crossref","unstructured":"Camenisch J, Michels M. A group signature scheme with improved efficiency. In Proc. Advances in Cryptology\u2014Asiacrypt 1998, Lecture Notes in Computer Science 1514, Beijing, China, 1998, pp.160\u2013174.","DOI":"10.1007\/3-540-49649-1_14"},{"key":"9008_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme. In Proc. Advances in Cryptology\u2014CRYPTO 2000, Lecture Notes in Computer Science 1880, Santa Barbara, California, USA, 2000, pp.255\u2013270.","DOI":"10.1007\/3-540-44598-6_16"},{"key":"9008_CR7","doi-asserted-by":"crossref","unstructured":"G Ateniese, B de Medeiros. Efficient Group Signatures without Trapdoors. In Proc. Advances in Cryptology\u2014Asiacrypt 2003, Lecture Notes in Computer Science 2894, Taipei, 2003, pp.246\u2013268.","DOI":"10.1007\/978-3-540-40061-5_15"},{"key":"9008_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. Advances in Cryptology\u2014Crypto 2004, Lecture Notes in Computer Science 3152, Santa Barbara, California, USA, 2004, pp.41\u201355.","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9008_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen L, Safavi-Naini R. Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In Proc. Advances in Cryptology\u2014Asiacrypt 2004, Lecture Notes in Computer Science 3329, Jeju Island, Korea, 2004, pp.372\u2013386.","DOI":"10.1007\/978-3-540-30539-2_26"},{"key":"9008_CR10","doi-asserted-by":"crossref","unstructured":"Nguyen L, Safavi-Naini R. Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. Cryptology ePrint Archive, Report 2004\/104, http:\/\/eprint.iacr.org\/2004\/104.","DOI":"10.1007\/978-3-540-30539-2_26"},{"key":"9008_CR11","unstructured":"Camenisch J. Group signature schemes and payment systems based on the discrete logarithm problem [Dissertation]. ETH Z\u00fcrich, 1998."},{"key":"9008_CR12","doi-asserted-by":"crossref","unstructured":"Boudot F. Efficient proofs that a committed number lies in an interval. In Proc. Advances in Cryptology\u2014Eurocrypt 2000, Lecture Notes in Computer Science 1807, Bruges, Belgium, 2000, pp.431\u2013444.","DOI":"10.1007\/3-540-45539-6_31"},{"key":"9008_CR13","unstructured":"Bellare M, Shi H, Zhang C. Foundations of Group Signatures: The case of dynamic groups. Cryptology ePrint Archive, Report 2004\/077, http:\/\/eprint.iacr.org\/2004\/077."},{"key":"9008_CR14","doi-asserted-by":"crossref","unstructured":"Fouque P, Pointcheval D. Threshold cryptosystems secure against chosen-ciphertext attacks. In Proc. Advances in Cryptology\u2014Asiacrypt 2001, Lecture Notes in Computer Science 2248, Gold Coast, Australia, 2001, pp.351\u2013368.","DOI":"10.1007\/3-540-45682-1_21"},{"key":"9008_CR15","unstructured":"Huang X, Susilo W, Mu Y. Breaking and repairing trapdoor-free group signature schemes from Asiacrypt 2004. Cryptology ePrint Archive, Report 2005\/122, http:\/\/eprint.iacr.org\/2005\/122."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9008-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9008-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9008-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:32:38Z","timestamp":1559385158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9008-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9008"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9008-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}