{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:25:52Z","timestamp":1768595152698,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,8,17]],"date-time":"2014-08-17T00:00:00Z","timestamp":1408233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11432-014-5152-2","type":"journal-article","created":{"date-parts":[[2014,8,16]],"date-time":"2014-08-16T07:18:08Z","timestamp":1408173488000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Analysis and improvement of a provable secure fuzzy identity-based signature scheme"],"prefix":"10.1007","volume":"57","author":[{"given":"Hu","family":"Xiong","sequence":"first","affiliation":[]},{"given":"YaNan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"GuoBin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"ZhiGuang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,17]]},"reference":[{"key":"5152_CR1","first-page":"012107","volume":"56","author":"H B Tian","year":"2013","unstructured":"Tian H B, Zhang F G, Chen X F, et al. Selectively unforgeable but existentially forgeable signature schemes and applications. Sci China Inf Sci, 2013, 56: 012107","journal-title":"Sci China Inf Sci"},{"key":"5152_CR2","first-page":"052115","volume":"56","author":"J J Shi","year":"2013","unstructured":"Shi J J, Shi R H, Guo Y, et al. Batch proxy quantum blind signature scheme. Sci China Inf Sci, 2013, 56: 052115","journal-title":"Sci China Inf Sci"},{"key":"5152_CR3","first-page":"112108","volume":"56","author":"F H Wang","year":"2013","unstructured":"Wang F H, Hu Y P, Wang B C. Lattice-based linearly homomorphic signature scheme over binary field. Sci China Inf Sci, 2013, 56: 112108","journal-title":"Sci China Inf Sci"},{"key":"5152_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, IT-22: 644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"5152_CR5","series-title":"LNCS","first-page":"47","volume-title":"Proceedings of CRYPTO 1984","author":"A Shamir","year":"1985","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1985. 47\u201353"},{"key":"5152_CR6","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography","author":"F Hess","year":"2003","unstructured":"Hess F. Efficient identity based signature schemes based on pairings. In: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, LNCS 2595. Berlin: Springer-Verlag, 2003. 310\u2013324"},{"key":"5152_CR7","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1007\/s11432-011-4413-6","volume":"54","author":"D S Xing","year":"2011","unstructured":"Xing D S, Cao Z F, Dong X L. Identity based signature scheme based on cubic residues. Sci China Inf Sci, 2011, 54: 2001\u20132012","journal-title":"Sci China Inf Sci"},{"key":"5152_CR8","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11432-007-0038-1","volume":"50","author":"Z C Chai","year":"2007","unstructured":"Chai Z C, Cao Z F, Dong X L. Identity-based signature scheme based on quadratic residues. Sci China Inf Sci, 2007, 50: 373\u2013380","journal-title":"Sci China Inf Sci"},{"key":"5152_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Proceedings of EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005. 457\u2013473"},{"key":"5152_CR10","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1016\/j.compeleceng.2011.04.013","volume":"37","author":"P Y Yang","year":"2011","unstructured":"Yang P Y, Cao Z F, Dong X L. Fuzzy identity based signature with applications to biometric authentication. Comput Electr Eng, 2011, 37: 532\u2013540","journal-title":"Comput Electr Eng"},{"key":"5152_CR11","doi-asserted-by":"crossref","first-page":"2139","DOI":"10.1007\/s11432-011-4454-x","volume":"55","author":"C J Wang","year":"2012","unstructured":"Wang C J. A provable secure fuzzy identity based signature scheme. Sci China Inf Sci, 2012, 55: 2139\u20132148","journal-title":"Sci China Inf Sci"},{"key":"5152_CR12","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Commun ACM, 1979, 22: 612\u2013613","journal-title":"Commun ACM"},{"key":"5152_CR13","series-title":"LNCS","first-page":"262","volume-title":"Proceedings of PKC 2004","author":"J Baek","year":"2004","unstructured":"Baek J, Zheng Y. Identity-based threshold decryption. In: Proceedings of PKC 2004, LNCS 2947. Berlin: Springer-Verlag, 2004. 262\u2013276"},{"key":"5152_CR14","first-page":"124","volume-title":"Proceedings of IEEE Int Conf Information Technology: Coding and Computing (ITCC\u2019 04), Las Vegas","author":"J Baek","year":"2004","unstructured":"Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. In: Proceedings of IEEE Int Conf Information Technology: Coding and Computing (ITCC\u2019 04), Las Vegas, 2004. 124\u2013128"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5152-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5152-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5152-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:37:58Z","timestamp":1559389078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5152-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,17]]},"references-count":14,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["5152"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5152-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,17]]}}}