{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:33:44Z","timestamp":1762868024876},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11704-018-8106-9","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T08:04:30Z","timestamp":1576829070000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm"],"prefix":"10.1007","volume":"14","author":[{"given":"Yudi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"issue":"3","key":"8106_CR1","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1108\/09685220710759559","volume":"15","author":"N L Clarke","year":"2007","unstructured":"Clarke N L, Mekala A R. The application of signature recognition to transparent handwriting verification for mobile devices. Information Management & Computer Security, 2007, 15(3): 214\u2013225","journal-title":"Information Management & Computer Security"},{"key":"8106_CR2","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/978-0-85729-859-1_30","volume-title":"Handbook of Document Image Processing and Recognition","author":"R Plamondon","year":"2014","unstructured":"Plamondon R, Pirlo G, Impedovo D. Online signature verification. Handbook of Document Image Processing and Recognition, Springer, London, 2014, 917\u2013947"},{"issue":"6","key":"8106_CR3","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2014.2316472","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae N, Memon N. Online signature verification on mobile devices. IEEE Transactions on Information Forensics and Security, 2014, 9(6): 933\u2013947","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8106_CR4","doi-asserted-by":"publisher","first-page":"12966","DOI":"10.1109\/ACCESS.2018.2809684","volume":"6","author":"Q Lin","year":"2018","unstructured":"Lin Q, Li J, Huang Z, Chen W, Shen J. A short linearly homomorphic proxy signature scheme. IEEE Access, 2018, 6: 12966\u201312972","journal-title":"IEEE Access"},{"issue":"11","key":"8106_CR5","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612\u2013613","journal-title":"Communications of the ACM"},{"issue":"6","key":"8106_CR6","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1049\/iet-ifs.2013.0302","volume":"8","author":"L Harn","year":"2014","unstructured":"Harn L. Comments on\u2019fair (t, n) threshold secret sharing scheme\u2019. IET Information Security, 2014, 8(6): 303\u2013304","journal-title":"IET Information Security"},{"issue":"9","key":"8106_CR7","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.ipl.2014.04.006","volume":"114","author":"L Harn","year":"2014","unstructured":"Harn L, Fuyou M. Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information Processing Letters, 2014, 114(9): 504\u2013509","journal-title":"Information Processing Letters"},{"key":"8106_CR8","doi-asserted-by":"crossref","unstructured":"Kurihara J, Kiyomoto S, Fukushima K, Tanaka T. A new (k, n)-threshold secret sharing scheme and its extension. In: Proceedings of International Conference on Information Security. 2008, 455\u2013470","DOI":"10.1007\/978-3-540-85886-7_31"},{"key":"8106_CR9","doi-asserted-by":"crossref","unstructured":"Stadler M. Publicly verifiable secret sharing. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 190\u2013199","DOI":"10.1007\/3-540-68339-9_17"},{"issue":"2","key":"8106_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00145-006-0334-8","volume":"20","author":"T Tassa","year":"2007","unstructured":"Tassa T. Hierarchical threshold secret sharing. Journal of Cryptology, 2007, 20(2): 237\u2013264","journal-title":"Journal of Cryptology"},{"key":"8106_CR11","doi-asserted-by":"crossref","unstructured":"Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 354\u2013371","DOI":"10.1007\/3-540-68339-9_31"},{"key":"8106_CR12","doi-asserted-by":"crossref","unstructured":"MacKenzie P, Reiter M K. Two-party generation of DSA signatures. In: Proceedings of Annual International Cryptology Conference. 2001, 137\u2013154","DOI":"10.1007\/3-540-44647-8_8"},{"key":"8106_CR13","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"Victor Shoup","year":"2000","unstructured":"Shoup V. Practical threshold signatures. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2000, 207\u2013220"},{"key":"8106_CR14","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"8106_CR15","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. 2007, 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"8106_CR16","first-page":"1","volume":"71","author":"K Itakura","year":"1983","unstructured":"Itakura K. A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development, 1983, 71: 1\u20138","journal-title":"NEC Research & Development"},{"issue":"6","key":"8106_CR17","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1049\/el:20000422","volume":"36","author":"L Yi","year":"2000","unstructured":"Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters, 2000, 36(6): 527\u2013528","journal-title":"Electronics Letters"},{"key":"8106_CR18","doi-asserted-by":"crossref","unstructured":"Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B. Sequential aggregate signatures and multisignatures without random oracles. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2006, 465\u2013485","DOI":"10.1007\/11761679_28"},{"key":"8106_CR19","doi-asserted-by":"crossref","unstructured":"Ristenpart T, Yilek S. The power of proofs-of-possession: securing multiparty signatures against rogue-key attacks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2007, 228\u2013245","DOI":"10.1007\/978-3-540-72540-4_13"},{"issue":"3","key":"8106_CR20","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.ins.2008.05.039","volume":"179","author":"F Cao","year":"2009","unstructured":"Cao F, Cao Z. A secure identity-based proxy multi-signature scheme. Information Sciences, 2009, 179(3): 292\u2013302","journal-title":"Information Sciences"},{"issue":"1","key":"8106_CR21","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.amc.2004.10.046","volume":"169","author":"X Li","year":"2005","unstructured":"Li X, Chen K. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation, 2005, 169(1): 437\u2013450","journal-title":"Applied Mathematics and Computation"},{"key":"8106_CR22","doi-asserted-by":"crossref","unstructured":"Park J M, Chong E K, Siegel H J. Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. In: Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing. 2003, 172\u2013181","DOI":"10.1145\/872035.872060"},{"key":"8106_CR23","doi-asserted-by":"crossref","unstructured":"Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Proceedings of International Workshop on Public Key Cryptography. 2003, 31\u201346","DOI":"10.1007\/3-540-36288-6_3"},{"key":"8106_CR24","unstructured":"Obi O O. Security issues in mobile ad-hoc networks: a survey. The 17th White House Papers Graduate Research In Informatics at Sussex, 2004"},{"key":"8106_CR25","doi-asserted-by":"crossref","unstructured":"Beimel A. Secret-sharing schemes: a survey. In: Proceedings of International Conference on Coding and Cryptology. 2011, 11\u201346","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"8106_CR26","unstructured":"Alam M K. An approach secret sharing algorithm in cloud computing security over single to multi clouds. CiteSeer, 2013"},{"issue":"2","key":"8106_CR27","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00145-006-0334-8","volume":"20","author":"T Tassa","year":"2007","unstructured":"Tassa T. Hierarchical threshold secret sharing. Journal of Cryptology, 2007, 20(2): 237\u2013264","journal-title":"Journal of Cryptology"},{"key":"8106_CR28","doi-asserted-by":"crossref","unstructured":"Hazay C, Lindell Y. Efficient Secure Two-party Protocols: Techniques and Constructions. Springer Science & Business Media, 2010","DOI":"10.1007\/978-3-642-14303-8"},{"key":"8106_CR29","doi-asserted-by":"crossref","unstructured":"Hazay C, Mikkelsen G L, Rabin T, Toft T. Efficient RSA key generation and threshold paillier in the two-party setting. In: Proceedings of Cryptographers\u2019 Track at the RSA Conference. 2012, 313\u2013331","DOI":"10.1007\/978-3-642-27954-6_20"},{"key":"8106_CR30","doi-asserted-by":"crossref","unstructured":"Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference. 2017, 613\u2013644","DOI":"10.1007\/978-3-319-63715-0_21"},{"issue":"3","key":"8106_CR31","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C P Schnorr","year":"1991","unstructured":"Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4(3): 161\u2013174","journal-title":"Journal of Cryptology"},{"key":"8106_CR32","doi-asserted-by":"crossref","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1999, 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-018-8106-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-018-8106-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-018-8106-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:52:28Z","timestamp":1608252748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-018-8106-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["8106"],"URL":"https:\/\/doi.org\/10.1007\/s11704-018-8106-9","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,19]]},"assertion":[{"value":"22 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"143803"}}