{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T21:44:41Z","timestamp":1696628681919},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2012,7,11]],"date-time":"2012-07-11T00:00:00Z","timestamp":1341964800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s12243-012-0315-x","type":"journal-article","created":{"date-parts":[[2012,7,10]],"date-time":"2012-07-10T13:31:55Z","timestamp":1341927115000},"page":"231-237","source":"Crossref","is-referenced-by-count":7,"title":["Efficient ID-based multiproxy multisignature without bilinear maps in ROM"],"prefix":"10.1007","volume":"68","author":[{"given":"Namita","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Sahadeo","family":"Padhye","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,11]]},"reference":[{"key":"315_CR1","first-page":"47","volume":"196","author":"A Shamir","year":"1998","unstructured":"Shamir A (1998) Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto LNCS 196:47\u201353","journal-title":"Advances in Cryptology-Crypto LNCS"},{"issue":"9","key":"315_CR2","first-page":"1338","volume":"E79-A","author":"M Mambo","year":"1996","unstructured":"Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign messages. IEICE T Fund Electrt E79-A(9):1338\u20131353","journal-title":"IEICE T Fund Electrt"},{"issue":"3","key":"315_CR3","first-page":"264","volume":"9","author":"M Das","year":"2009","unstructured":"Das M,Saxena A and Pathak DB (2009) Algorithms and approaches of proxy signature: a survey. Int J Netw Secur 9(3):264\u2013284","journal-title":"Int J Netw Secur"},{"key":"315_CR4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0096-3003(02)00650-1","volume":"147","author":"SJ Hwang","year":"2004","unstructured":"Hwang SJ, Chen CC (2004) New multi-proxy multi-signature schemes. Appl Math Comput 147:57\u201367","journal-title":"Appl Math Comput"},{"key":"315_CR5","doi-asserted-by":"crossref","unstructured":"Guo S, Cao Z, Lu R (2006) An efficient ID-based multi-proxy multi-signature scheme. In: Proceedings of the first international multi-symposiums on computer and computational sciences (IMSCCS\u201906), IEEE","DOI":"10.1109\/IMSCCS.2006.180"},{"key":"315_CR6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.compeleceng.2006.08.003","volume":"33","author":"L Guo","year":"2007","unstructured":"Guo L, Wang G (2007) Insider attacks on multi-proxy multi-signature schemes. Comput Electr Eng 33:88\u201393","journal-title":"Comput Electr Eng"},{"key":"315_CR7","author":"MS Hwang","year":"2008","unstructured":"Hwang MS, Tzeng SF, Chiou SF (2008) An ordered multi-proxy multi-signature Scheme. Eighth international conference on intelligent systems design and applications, IEEE. doi: 10.1109\/ISDA.2008.189","journal-title":"IEEE"},{"key":"315_CR8","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.amc.2004.10.046","volume":"169","author":"X Li","year":"2005","unstructured":"Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169:437\u2013450","journal-title":"Appl Math Comput"},{"key":"315_CR9","unstructured":"Sahu RA, Padhye S (2010) An ID-based multi-proxy multi-signature scheme. In: Proceeding of IEEE international conference on computer & communication technology ICCCT-2010, pp\u00a060\u201363"},{"key":"315_CR10","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1016\/j.amc.2004.06.117","volume":"167","author":"YD Lyuu","year":"2005","unstructured":"Lyuu YD, Wu ML (2005) Cryptanalysis of and improvement on the Hwang\u2013Chen multi-proxy multi-signature schemes. Appl Math Comput 167:729\u2013739","journal-title":"Appl Math Comput"},{"key":"315_CR11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2006","unstructured":"Chen L, Cheng Z, Smart NP (2006) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213\u2013241","journal-title":"Int J Inf Secur"},{"key":"315_CR12","author":"D He","year":"2011","unstructured":"He D, Chen J, Hu J (2011) An ID-based proxy signature schemes without bilinear pairings. Ann Telecommun. doi: 10.1007\/s12243-011-0244-0","journal-title":"Ann Telecommun"},{"issue":"177","key":"315_CR13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"315_CR14","unstructured":"Miller V (1985) Uses of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology-CRYPTO 85, proceedings, Lecture notes in computer science. Springer, No 218, pp 417\u2013426."},{"key":"315_CR15","unstructured":"SECI (2000) Elliptic curve cryptography, standands for efficient cryptography. Available online http:\/\/www.secg-talk@listscerticom.com . Accessed 20 Sept 2000"},{"key":"315_CR16","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient schemes. In: Proceedings of the 1st ACM conference on computer and communications security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"315_CR17","author":"J Liu","year":"2010","unstructured":"Liu J, Baek J, Zhou J, Yang Y, Wong J (2010) Efficient online\/offline identity-based signature for wireless sensor network. Int J Inf Secur. doi: 10.1007\/s10207-010-0109-y","journal-title":"Int J Inf Secur"},{"key":"315_CR18","unstructured":"Shamus Software Ltd. (1988) Miracl library. http:\/\/www.shamus.ie\/index.php?page=home"},{"key":"315_CR19","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci 180:2895\u20132903","journal-title":"Inf Sci"},{"issue":"11","key":"315_CR20","doi-asserted-by":"crossref","first-page":"4136","DOI":"10.1109\/TWC.2007.060255","volume":"6","author":"K Ren","year":"2007","unstructured":"Ren K, Lou W, Zeng K, Moran PJ (2007) On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun 6(11):4136\u20134144","journal-title":"IEEE Trans. Wirel. Commun"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-012-0315-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-012-0315-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-012-0315-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T19:33:16Z","timestamp":1561923196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-012-0315-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,11]]},"references-count":20,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["315"],"URL":"https:\/\/doi.org\/10.1007\/s12243-012-0315-x","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,11]]}}}