{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:06:50Z","timestamp":1648937210186},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T00:00:00Z","timestamp":1201824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Ser. F-Inf. Sci."],"published-print":{"date-parts":[[2008,2]]},"DOI":"10.1007\/s11432-008-0003-7","type":"journal-article","created":{"date-parts":[[2008,1,17]],"date-time":"2008-01-17T15:26:57Z","timestamp":1200583617000},"page":"128-144","source":"Crossref","is-referenced-by-count":5,"title":["Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs"],"prefix":"10.1007","volume":"51","author":[{"given":"ChunMing","family":"Tang","sequence":"first","affiliation":[]},{"given":"DingYi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"ZhuoJun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Barak B. Delegateable Signatures, 2001. http:\/\/www.math.ias.edu\/boaz\/Papers\/delgsigs.ps"},{"key":"3_CR2","unstructured":"Mambo M, Usuda K, Okamoto E. Proxy Signatures. In: Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95). 1995, B1.1.1\u201317"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Feige U, Shamir A. Witness Indistinguishable and Witness Hiding Protocols. In: 22nd ACM Symposium on the Theory of Computing. 1990. 416\u2013426","DOI":"10.1145\/100216.100272"},{"key":"3_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography (Basic Tools)","author":"O. Goldreich","year":"2001","unstructured":"Goldreich O. Foundations of Cryptography (Basic Tools). Cambridge: Cambridge University Press, 2001"},{"key":"3_CR5","unstructured":"Damgard I. On \u03a3-protocols. Available at http:\/\/www.daimi.au.dk\/ivan\/sigma.ps"},{"issue":"2","key":"3_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17(2): 281\u2013308","journal-title":"SIAM J Comput"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich O, Sahai A, Vadhan S. Honest Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge. In: Proc. 30th STOC. 1998, 399\u2013408","DOI":"10.1145\/276698.276852"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Vadhan S. An unconditional study of computational zero-knowledge. In: FOCS 04. 2004, 176\u2013185","DOI":"10.1109\/FOCS.2004.13"},{"key":"3_CR9","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1996","unstructured":"Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton, Florida: CRC Press, 1996"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-008-0003-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-008-0003-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-008-0003-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:35:54Z","timestamp":1559403354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-008-0003-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,2]]}},"alternative-id":["3"],"URL":"https:\/\/doi.org\/10.1007\/s11432-008-0003-7","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"value":"1009-2757","type":"print"},{"value":"1862-2836","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,2]]}}}