{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:17:22Z","timestamp":1766578642302},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11432-018-9589-x","type":"journal-article","created":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T07:02:36Z","timestamp":1586588556000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure two-party SM9 signing"],"prefix":"10.1007","volume":"63","author":[{"given":"Yongheng","family":"Mu","sequence":"first","affiliation":[]},{"given":"Haixia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Peili","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tianjun","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,26]]},"reference":[{"key":"9589_CR1","volume-title":"Bitcoin: a peer-to-peer electronic cash system","author":"S Nakamoto","year":"2009","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2009. http:\/\/www.bitcoin.org\/bitcoin.pdf 2"},{"key":"9589_CR2","first-page":"47","volume-title":"Proceedings of Workshop on the Theory and Application of Cryptographic Techniques","author":"A Shamir","year":"1984","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1984. 47\u201353"},{"key":"9589_CR3","first-page":"26","volume-title":"Proceedings of Symposium on Cryptography and Information Security","author":"R Sakai","year":"2000","unstructured":"Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, 2000. 26\u201328"},{"key":"9589_CR4","first-page":"213","volume-title":"Proceedings of Annual International Cryptology Conference","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceedings of Annual International Cryptology Conference, 2001. 213\u2013229"},{"key":"9589_CR5","first-page":"613","volume-title":"Proceedings of Annual International Cryptology Conference","author":"Y Lindell","year":"2017","unstructured":"Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference, 2017. 613\u2013644"},{"key":"9589_CR6","first-page":"307","volume-title":"Proceedings of Conference on the Theory and Application of Cryptology","author":"Y Desmedt","year":"1989","unstructured":"Desmedt Y, Frankel Y. Threshold cryptosystems. In: Proceedings of Conference on the Theory and Application of Cryptology, 1989. 307\u2013315"},{"key":"9589_CR7","first-page":"457","volume-title":"Proceedings of Annual International Cryptology Conference","author":"Y Desmedt","year":"1991","unstructured":"Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Annual International Cryptology Conference, 1991. 457\u2013469"},{"key":"9589_CR8","first-page":"223","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"P Paillier","year":"1999","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1999. 223\u2013238"},{"key":"9589_CR9","first-page":"494","volume-title":"Proceedings of the 34th Annual ACM Symposium on Theory of Computing","author":"R Canetti","year":"2002","unstructured":"Canetti R, Lindell Y, Ostrovsky R, et al. Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002. 494\u2013503"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9589-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-018-9589-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9589-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T20:02:42Z","timestamp":1632081762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-018-9589-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,26]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["9589"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9589-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,26]]},"assertion":[{"value":"1 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"189101"}}