{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:14:39Z","timestamp":1724890479919},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11416-021-00382-2","type":"journal-article","created":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T07:03:16Z","timestamp":1618297396000},"page":"71-80","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On delegatability of MDVS schemes"],"prefix":"10.1007","volume":"18","author":[{"given":"Parvin","family":"Rastegari","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,13]]},"reference":[{"issue":"2","key":"382_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"382_CR2","doi-asserted-by":"crossref","unstructured":"Chaum, D., Van Antwerpen, H.: Undeniable signatures, In: Conference on the Theory and Application of Cryptology, Springer, New York, pp. 212\u2013216 (1989)","DOI":"10.1007\/0-387-34805-0_20"},{"key":"382_CR3","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 143\u2013154 (1996)","DOI":"10.1007\/3-540-68339-9_13"},{"key":"382_CR4","unstructured":"Chaum, D.: Private signature and proof systems, U.S. Patent 5493614 (1996)"},{"key":"382_CR5","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp. 523\u2013542 (2003)","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"382_CR6","unstructured":"Desmedt, Y.: Verifier-designated signatures, Rump session. Crypto 3 (2003)"},{"key":"382_CR7","doi-asserted-by":"crossref","unstructured":"Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures, In: International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, pp. 495\u2013507 (2004)","DOI":"10.1007\/978-3-540-30191-2_38"},{"key":"382_CR8","doi-asserted-by":"crossref","unstructured":"Ng, C. Y., Susilo, W., Mu, Y.: Universal designated multi verifier signature schemes. In: Proceedings 11th International Conference on Parallel and Distributed Systems, IEEE, vol. 2, pp. 305\u2013309 (2005)","DOI":"10.1109\/ICPADS.2005.287"},{"key":"382_CR9","doi-asserted-by":"crossref","unstructured":"Shailaja, G., Kumar, K.P., Saxena, A.: Universal designated multi verifier signature without random oracles. In: 9th International Conference on Information Technology, ICIT\u201906, IEEE, pp. 168\u2013171 (2006)","DOI":"10.1109\/ICIT.2006.86"},{"key":"382_CR10","doi-asserted-by":"crossref","unstructured":"Chow, S.S.: Identity-based strong multi-designated verifiers signatures. In: European Public Key Infrastructure Workshop, Springer, Berlin, pp. 257\u2013259 (2006)","DOI":"10.1007\/11774716_23"},{"key":"382_CR11","doi-asserted-by":"crossref","unstructured":"Ng, C.Y., Susilo, W., Mu, Y.: Designated group credentials, In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ACM, pp. 59\u201365 (2006)","DOI":"10.1145\/1128817.1128829"},{"issue":"2\u20133","key":"382_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ipl.2006.08.015","volume":"102","author":"F Laguillaumie","year":"2007","unstructured":"Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Inf. Process.Lett. 102(2\u20133), 127\u2013132 (2007)","journal-title":"Inf. Process.Lett."},{"key":"382_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated verifier signature: definition, framework and new constructions. In: International Conference on Ubiquitous Intelligence and Computing, Springer, Berlin, pp. 1191\u20131200 (2007)","DOI":"10.1007\/978-3-540-73549-6_116"},{"issue":"3","key":"382_CR14","first-page":"348","volume":"7","author":"SS Chow","year":"2008","unstructured":"Chow, S.S.: Multi-designated verifiers signatures revisited. IJ Netw. Secur. 7(3), 348\u2013357 (2008)","journal-title":"IJ Netw. Secur."},{"key":"382_CR15","doi-asserted-by":"crossref","unstructured":"Yang, M., Yumin, W.: Universal designated multi verifier signature scheme without random oracles. Wuhan Univ. J. Nat. Sci. 13(6), 685\u2013691 (2008)","DOI":"10.1007\/s11859-008-0610-6"},{"issue":"5","key":"382_CR16","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.csi.2007.08.020","volume":"30","author":"SH Seo","year":"2008","unstructured":"Seo, S.H., Hwang, J.Y., Choi, K.Y., Lee, D.H.: Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5), 288\u2013295 (2008)","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"382_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s11460-008-0035-1","volume":"3","author":"B Yang","year":"2008","unstructured":"Yang, B., Xiao, Z., Yang, Y., Hu, Z., Niu, Z.: A strong multi-designated verifiers signature scheme. Front. Electr. Electron. Eng. China 3(2), 167\u2013170 (2008)","journal-title":"Front. Electr. Electron. Eng. China"},{"issue":"01","key":"382_CR18","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1142\/S0129054109006474","volume":"20","author":"D Vergnaud","year":"2009","unstructured":"Vergnaud, D.: New extensions of pairing-based signatures into universal (multi) designated verifier signatures. Int. J. Found. Comput. Sci. 20(01), 109\u2013133 (2009)","journal-title":"Int. J. Found. Comput. Sci."},{"issue":"7","key":"382_CR19","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.ic.2011.03.002","volume":"209","author":"TY Chang","year":"2011","unstructured":"Chang, T.Y.: An ID-based multi-signer universal designated multi-verifier signature scheme. Inf. Comput. 209(7), 1007\u20131015 (2011)","journal-title":"Inf. Comput."},{"key":"382_CR20","doi-asserted-by":"crossref","unstructured":"Tian, H.: A new strong multiple designated verifiers signature for broadcast propagation. In: Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 268\u2013274 (2011)","DOI":"10.1109\/INCoS.2011.31"},{"issue":"1","key":"382_CR21","first-page":"1","volume":"3","author":"H Tian","year":"2011","unstructured":"Tian, H.: A new strong multiple designated verifiers signature. Int. J. Grid Util. Comput. 3(1), 1\u201311 (2011)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"8","key":"382_CR22","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1002\/cpe.3094","volume":"26","author":"MH Au","year":"2014","unstructured":"Au, M.H., Yang, G., Susilo, W., Zhang, Y.: (Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8), 1574\u20131592 (2014)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"1","key":"382_CR23","first-page":"617","volume":"45","author":"L Deng","year":"2018","unstructured":"Deng, L., Zeng, J., Huang, H.: ID-based multi-signer universal designated multi-verifier signature based on discrete logarithm. Chiang Mai J. Sci. 45(1), 617\u2013624 (2018)","journal-title":"Chiang Mai J. Sci."},{"issue":"5","key":"382_CR24","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1049\/iet-ifs.2018.5063","volume":"13","author":"P Rastegari","year":"2019","unstructured":"Rastegari, P., Dakhilalian, M., Berenjkoub, M., Susilo, W.: Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. IET Inf. Secur. 13(5), 459\u2013468 (2019)","journal-title":"IET Inf. Secur."},{"key":"382_CR25","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: attacks, new security notions and a new construction. In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, Proceedings, pp. 459\u2013471 ( 2005)","DOI":"10.1007\/11523468_38"},{"key":"382_CR26","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.ins.2014.05.020","volume":"281","author":"KA Shim","year":"2014","unstructured":"Shim, K.A.: On delegatability of designated verifier signature schemes. Inf. Sci. 281, 365\u2013372 (2014)","journal-title":"Inf. Sci."},{"key":"382_CR27","doi-asserted-by":"crossref","unstructured":"Tian, H., Jiang, Z., Liu, Y. and Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp. 237\u2013244 (2012)","DOI":"10.1109\/iNCoS.2012.85"},{"key":"382_CR28","doi-asserted-by":"crossref","unstructured":"Huang, X., Susilo, W., Mu, Y. and Wu, W.: Universal designated verifier signature without delegatability. In: International Conference on Information and Communications Security, Springer, Berlin, pp. 479\u2013498 (2006)","DOI":"10.1007\/11935308_34"},{"key":"382_CR29","unstructured":"Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme. In: IACR Cryptology ePrint Archive, p 507 (2008)"},{"key":"382_CR30","unstructured":"Huang, Q., Susilo, W., Wong, D.S.: Non-delegatable l. In: IACR Cryptology ePrint Archive vol. 367 (2009)"},{"issue":"6","key":"382_CR31","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10207-011-0146-1","volume":"10","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Secur. 10(6), 373 (2011)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"382_CR32","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jss.2010.08.057","volume":"84","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1), 120\u2013129 (2011)","journal-title":"J. Syst. Softw."},{"key":"382_CR33","doi-asserted-by":"crossref","unstructured":"Tian, H., Chen, X., Jiang, Z. and Du, Y.: Non-delegatable strong designated verifier signature on elliptic curves. In: International Conference on Information Security and Cryptology, Springer, Berlin, pp. 219\u2013234 (2011)","DOI":"10.1007\/978-3-642-31912-9_15"},{"key":"382_CR34","unstructured":"Asaar, M.R., Salmasizadeh, M.: A Non-delegatable identity-based designated verifier signature scheme without bilinear pairings. In: IACR Cryptology ePrint Archive, vol. 332 (2012)"},{"issue":"5\u20136","key":"382_CR35","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.mcm.2013.01.010","volume":"58","author":"H Tian","year":"2013","unstructured":"Tian, H., Chen, X., Zhang, F., Wei, B., Jiang, Z., Liu, Y.: A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5\u20136), 1289\u20131300 (2013)","journal-title":"Math. Comput. Model."},{"issue":"3","key":"382_CR36","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/s11704-013-3120-4","volume":"8","author":"H Tian","year":"2014","unstructured":"Tian, H., Li, J.: A short non-delegatable strong designated verifier signature. Front. Comput. Sci. 8(3), 490\u2013502 (2014)","journal-title":"Front. Comput. Sci."},{"key":"382_CR37","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.ins.2018.12.020","volume":"479","author":"P Rastegari","year":"2019","unstructured":"Rastegari, P., Berenjkoub, M., Dakhilalian, M., Susilo, W.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321\u2013334 (2019)","journal-title":"Inf. Sci."},{"key":"382_CR38","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, Springer, Berlin, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"382_CR39","doi-asserted-by":"crossref","unstructured":"Waters, B. Efficient identity-based encryption without random oracles. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in cryptology\u2013EUROCRYPT 2005, Aarhus, Denmark, Proceedings, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"},{"key":"382_CR40","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications Security, ACM, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00382-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-021-00382-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00382-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T05:58:22Z","timestamp":1724824702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-021-00382-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["382"],"URL":"https:\/\/doi.org\/10.1007\/s11416-021-00382-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"14 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}