{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:08Z","timestamp":1764996908945},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2011,2,27]],"date-time":"2011-02-27T00:00:00Z","timestamp":1298764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s12243-011-0244-0","type":"journal-article","created":{"date-parts":[[2011,2,26]],"date-time":"2011-02-26T13:54:42Z","timestamp":1298728482000},"page":"657-662","source":"Crossref","is-referenced-by-count":58,"title":["An ID-based proxy signature schemes without bilinear pairings"],"prefix":"10.1007","volume":"66","author":[{"given":"He","family":"Debiao","sequence":"first","affiliation":[]},{"given":"Chen","family":"Jianhua","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,27]]},"reference":[{"key":"244_CR1","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984. Lecture Notes in Computer Science. vol 196, pp. 47\u201353"},{"issue":"9","key":"244_CR2","first-page":"1338","volume":"E79-A","author":"M Mambo","year":"1996","unstructured":"Mambo M, Usuda K, Okamoto E (1996) Proxy signature: delegation of the power to sign messages. IEICE Trans Fundamentals E79-A(9):1338\u20131353","journal-title":"IEICE Trans Fundamentals"},{"key":"244_CR3","first-page":"18","volume-title":"PKC 2003. LNCS. vol 2567","author":"JC Cha","year":"2002","unstructured":"Cha JC, Cheon JH (2002) An identity-based signature from gap Diffie-Hellman groups. In: Desmedt YG (ed) PKC 2003. LNCS. vol 2567. Springer, Heidelberg, pp 18\u201330"},{"key":"244_CR4","first-page":"310","volume-title":"SAC 2002. LNCS, vol 2595","author":"F Hess","year":"2003","unstructured":"Hess F (2003) Efficient identity based signature schemes based on pairings. In: Nyberg K, Heys HM (eds) SAC 2002. LNCS, vol 2595. Springer, Heidelberg, pp 310\u2013324"},{"key":"244_CR5","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"ASIACRYPT 2005. LNCS, vol 3788","author":"PSLM Barreto","year":"2005","unstructured":"Barreto PSLM, Libert B, McCullagh N, Quisquater J (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy B (ed) ASIACRYPT 2005. LNCS, vol 3788. Springer, Heidelberg, pp 515\u2013532"},{"key":"244_CR6","first-page":"1277","volume-title":"ICCNMC 2005. LNCS, vol 3619","author":"C Gu","year":"2005","unstructured":"Gu C, Zhu Y (2005) Provable security of ID-based proxy signature schemes. In: Lu X, Zhao W (eds) ICCNMC 2005. LNCS, vol 3619. Springer, Heidelberg, pp 1277\u20131286"},{"key":"244_CR7","first-page":"133","volume":"12","author":"J Zhang","year":"2007","unstructured":"Zhang J, Zou W (2007) Another ID-based proxy signature scheme and its extension. Wuhan Univ J Nat Sci 12:133\u2013136","journal-title":"Wuhan Univ J Nat Sci"},{"key":"244_CR8","unstructured":"Wu W, Mu Y, Susilo W et al. (2007) Identity-based proxy signature from pairings, ATC 2007, LNCS 4610, pp. 22\u201331."},{"key":"244_CR9","doi-asserted-by":"crossref","unstructured":"Gu C, Zhu Y (2008) An efficient ID-based proxy signature scheme from pairings. Inscrypt 2007, LNCS 4990, pp. 40\u201350","DOI":"10.1007\/978-3-540-79499-8_5"},{"key":"244_CR10","doi-asserted-by":"crossref","unstructured":"Ji H, Han W, Zhao L et al (2009) An identity-based proxy signature from bilinear pairings, 2009 WASE International Conference on Information Engineering, pp 14\u201317","DOI":"10.1109\/ICIE.2009.125"},{"key":"244_CR11","doi-asserted-by":"crossref","unstructured":"Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur (6):213\u2013241.","DOI":"10.1007\/s10207-006-0011-9"},{"issue":"3","key":"244_CR12","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"P David","year":"2000","unstructured":"David P, Jacque S (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396","journal-title":"J Cryptol"},{"key":"244_CR13","unstructured":"Shamus Software Ltd., Miracl library, http:\/\/www.shamus.ie\/index.php?page=home"},{"key":"244_CR14","unstructured":"The Certicom Corporation, SEC 2: Recommended Elliptic Curve Domain Parameters, www.secg.org\/collateral\/sec2_final.pdf"},{"key":"244_CR15","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with, minimal message exchanges. Inf Sci 180:2895\u20132903","journal-title":"Inf Sci"},{"key":"244_CR16","doi-asserted-by":"crossref","unstructured":"He D, Chen J, Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fussion, doi: 10.1016\/j.inffus.2011.01.001 .","DOI":"10.1016\/j.inffus.2011.01.001"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-011-0244-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-011-0244-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-011-0244-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T21:53:05Z","timestamp":1560030785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-011-0244-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,27]]},"references-count":16,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["244"],"URL":"https:\/\/doi.org\/10.1007\/s12243-011-0244-0","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,27]]}}}