{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:34:27Z","timestamp":1758267267603},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s11390-008-9126-y","type":"journal-article","created":{"date-parts":[[2008,4,10]],"date-time":"2008-04-10T20:01:21Z","timestamp":1207857681000},"page":"240-252","source":"Crossref","is-referenced-by-count":22,"title":["Generic Transformation from Weakly to Strongly Unforgeable Signatures"],"prefix":"10.1007","volume":"23","author":[{"given":"Qiong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi-Ming","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,5]]},"reference":[{"issue":"2","key":"9126_CR1","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, April 1988, 17(2): 281\u2013308.","journal-title":"SIAM J. Computing"},{"key":"9126_CR2","doi-asserted-by":"crossref","unstructured":"An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In Proc. EUROCRYPT 2002, Springer-Verlag, Amsterdam, The Netherlands, LNCS 2332, 2002, pp.83\u2013107.","DOI":"10.1007\/3-540-46035-7_6"},{"issue":"2","key":"9126_CR3","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D Dolev","year":"2000","unstructured":"Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM J. Computing, 2000, 30(2): 391\u2013437.","journal-title":"SIAM J. Computing"},{"key":"9126_CR4","doi-asserted-by":"crossref","unstructured":"Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. In Proc. EUROCRYPT04, Interlaken, Switzerland, LNCS 3027, Springer-Verlag, 2004, pp.207\u2013222.","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"9126_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. CRYPTO 2004, Santa Barbara, California, USA, LNCS 3152, 2004, pp.41\u201355.","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9126_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme. In Proc. CRYPTO 2000, Santa Barbara, California, USA, LNCS 1880, Springer-Verlag, 2000, pp.255\u2013270.","DOI":"10.1007\/3-540-44598-6_16"},{"key":"9126_CR7","doi-asserted-by":"crossref","unstructured":"Katz J, Yung M. Scalable protocols for authenticated group key exchange. In Proc. CRYPTO 2003, Santa Barbara, California, USA, LNCS 2729, Springer-Verlag, 2003 pp.110\u2013125.","DOI":"10.1007\/978-3-540-45146-4_7"},{"key":"9126_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Shen E, Waters B. Strongly unforgeable signatures based on computational Diffe-Hellman. In Proc. PKC 2006, New York, NY, USA, Springer-Verlag, 2006, pp.229\u2013240.","DOI":"10.1007\/11745853_15"},{"key":"9126_CR9","doi-asserted-by":"crossref","unstructured":"Isamu Teranishi, Takuro Oyama,Wakaha Ogata. General conversion for obtaining strongly existentially unforgeable signatures. In Proc. Progress in Cryptology-IN-DOCRYPT 2006, Kolkata, India, LNCS 4329, Springer-Verlag, 2005, pp.191\u2013205.","DOI":"10.1007\/11941378_14"},{"key":"9126_CR10","doi-asserted-by":"crossref","unstructured":"Mihir Bellare, Sarah Shoup. Tow-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. In Proc. Public Key Cryptography, PKC 2007, Beijing, China, LNCS 4450, Springer-Verlag, 2007, pp.201\u2013216.","DOI":"10.1007\/978-3-540-71677-8_14"},{"key":"9126_CR11","doi-asserted-by":"crossref","unstructured":"Steinfeld R, Pieprzyk J, Wang H. How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. In Proc. CT-RSA 2007, San Francisco, CA, USA, LNCS 4377, Springer-Verlag, 2007, pp.357\u2013371.","DOI":"10.1007\/11967668_23"},{"key":"9126_CR12","doi-asserted-by":"crossref","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 84, Santa Barbara, California, USA, LNCS 196, Springer-Verlag, 1984, pp.47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"9126_CR13","doi-asserted-by":"crossref","unstructured":"Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, Taipei, LNCS 2894, Springer-Verlag, 2003, pp.452\u2013473.","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"9126_CR14","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S Even","year":"1996","unstructured":"Even S, Goldreich O, Micali S. On-line\/off-line digital signatures. J. Cryptology, 1996, 9(1): 35\u201367.","journal-title":"J. Cryptology"},{"key":"9126_CR15","doi-asserted-by":"crossref","unstructured":"Shamir A, Tauman Y. Improved online\/offline signature schemes. In Proc. CRYPTO 2001, Santa Barbara, California, USA, LNCS 2139, Springer-Verlag, 2001, pp.355\u2013367.","DOI":"10.1007\/3-540-44647-8_21"},{"key":"9126_CR16","first-page":"155","volume-title":"Digitalized Signatures. Foundations of Secure Computation","author":"M O Rabin","year":"1978","unstructured":"Rabin M O. Digitalized Signatures. Foundations of Secure Computation, New York: Academic Press, 1978, pp.155\u2013168."},{"key":"9126_CR17","unstructured":"Lamport L. Constructing digital signatures from a one way function. Technical Report CSL-98, SRI International, Oct. 1979."},{"key":"9126_CR18","unstructured":"Reyzin L, Reyzin N. Better than BiBa: Short one-time signatures with fast signing and verifying. In Proc. Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, LNCS 2384, Springer-Verlag, 2002, pp.144\u2013153."},{"key":"9126_CR19","doi-asserted-by":"crossref","unstructured":"Goldreich O. Foundations of Cryptography, Volume II, Basic Applications, Cambridge University Press, 2004.","DOI":"10.1017\/CBO9780511721656"},{"key":"9126_CR20","doi-asserted-by":"crossref","unstructured":"Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In Proc. 21st ACM Symposium on the Theory of Computing, Seattle, Washington D C, USA, 1989, pp.33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"9126_CR21","unstructured":"National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, Nov. 1994."},{"key":"9126_CR22","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. First ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, 1993, pp.62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"9126_CR23","doi-asserted-by":"crossref","unstructured":"Qiong Huang, Duncan S Wong, Yiming Zhao. Generic transformation to strongly unforgeable signatures. In Proc. Applied Cryptography and Network Security, ACNS 2007, Zhuhai, China, LNCS 4521, Springer-Verlag, 2007, pp.1\u201317.","DOI":"10.1007\/978-3-540-72738-5_1"},{"key":"9126_CR24","doi-asserted-by":"crossref","unstructured":"Dan Boneh, Xavier Boyen. Short signatures without random oracles. In Proc. EUROCRYPT 2004, Interlaken, Switzerland, LNCS 3027, 2004, pp.56\u201373.","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"9126_CR25","doi-asserted-by":"crossref","unstructured":"Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. In Proc. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, LNCS 4058, Springer-Verlag, 2006, pp.235\u2013246.","DOI":"10.1007\/11780656_20"},{"key":"9126_CR26","doi-asserted-by":"crossref","unstructured":"Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes. In Proc. EUROCRYPT 2004, Springer-Verlag, 2004, pp.268\u2013286.","DOI":"10.1007\/978-3-540-24676-3_17"},{"key":"9126_CR27","doi-asserted-by":"crossref","unstructured":"Chaum D, Van Heyst E. Group signatures. In Proc. EURO-CRYPT 91, Brighton, UK, LNCS 547, Springer-Verlag, 1991, pp.257\u2013265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"9126_CR28","doi-asserted-by":"crossref","unstructured":"Rivest R, Shamir A, Tauman Y. How to leak a secret. In Proc. ASIACRYPT 2001, Gold Coast, Australia, LNCS 2248, Springer-Verlag, 2001, pp.552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"issue":"9","key":"9126_CR29","first-page":"1338","volume":"E79-A","author":"M Mambo","year":"1996","unstructured":"Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundamentals, 1996, E79-A(9): 1338\u20131353.","journal-title":"IEICE Trans. Fundamentals"},{"key":"9126_CR30","doi-asserted-by":"crossref","unstructured":"Chaum D. Blind signatures for untraceable payments. In Proc. CRYPTO 82, Santa Barbara, California, USA, Plenum Press, 1983, pp.199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"9126_CR31","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I. Collision free hash functions and public key signature schemes. In Proc. EUROCRYPT87, Amsterdam, The Netherlands, LNCS 304, Springer-Verlag, 1988, pp.203\u2013216.","DOI":"10.1007\/3-540-39118-5_19"},{"key":"9126_CR32","doi-asserted-by":"crossref","unstructured":"Rogaway P, Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Proc. Fast Software Encryption 2004, Delhi, India, LNCS 3017, Springer-Verlag, 2004, pp.371\u2013388.","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"9126_CR33","unstructured":"Wei Dai. Crypto++ library. http:\/\/www.cryptopp.com\/ ."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9126-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-008-9126-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9126-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:32:40Z","timestamp":1559399560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-008-9126-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["9126"],"URL":"https:\/\/doi.org\/10.1007\/s11390-008-9126-y","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}