{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T19:01:11Z","timestamp":1693681271688},"reference-count":13,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Mathematics and Computation"],"published-print":{"date-parts":[[2003,12]]},"DOI":"10.1016\/s0096-3003(02)00500-3","type":"journal-article","created":{"date-parts":[[2003,2,4]],"date-time":"2003-02-04T19:54:18Z","timestamp":1044388458000},"page":"465-468","source":"Crossref","is-referenced-by-count":10,"title":["Traceability on RSA-based partially signature with low computation"],"prefix":"10.1016","volume":"145","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yan-Chi","family":"Lai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-3003(02)00500-3_BIB1","doi-asserted-by":"crossref","unstructured":"M. Abe, E. Fujisaki, How to date blind signatures, in: Advances in Cryptology\u2013\u2013ASIACRYPT\u201996, LNCS 1163, Springer-Verlag, November 1996, pp. 244\u2013251","DOI":"10.1007\/BFb0034851"},{"issue":"15","key":"10.1016\/S0096-3003(02)00500-3_BIB2","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1049\/el:19960886","article-title":"Parallel computation of the generating keys for RSA cryptosystems","volume":"32","author":"Chang","year":"1996","journal-title":"IEE Electronics Letters"},{"key":"10.1016\/S0096-3003(02)00500-3_BIB3","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind signatures system, in: Advances in Cryptology, CRYPTO\u201983, 1983, pp. 153\u2013156","DOI":"10.1007\/978-1-4684-4730-9_14"},{"key":"10.1016\/S0096-3003(02)00500-3_BIB4","unstructured":"H.Y. Chien, J.K. Jan, Y.M. Tseng, RSA-based partially blind signature with low computation, in: IEEE 8th International Conference on Parallel and Distributed Systems, June 2001, pp. 385\u2013389"},{"issue":"5","key":"10.1016\/S0096-3003(02)00500-3_BIB5","first-page":"818","article-title":"Low-computation partially blind signatures for electronic cash","volume":"E81-A","author":"Fan","year":"1998","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"2","key":"10.1016\/S0096-3003(02)00500-3_BIB6","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/69.991728","article-title":"An ElGamal-like cryptosystem for enciphering large messages","volume":"14","author":"Hwang","year":"2002","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"10.1016\/S0096-3003(02)00500-3_BIB7","first-page":"1181","article-title":"Traceability on low-computation partially blind signatures for electronic cash","volume":"E85A","author":"Hwang","year":"2002","journal-title":"IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences"},{"issue":"3","key":"10.1016\/S0096-3003(02)00500-3_BIB8","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3923\/jas.2001.287.288","article-title":"Cryptanalysis of the batch verifying multiple DSA-type digital signatures","volume":"1","author":"Hwang","year":"2001","journal-title":"Pakistan Journal of Applied Sciences"},{"issue":"1","key":"10.1016\/S0096-3003(02)00500-3_BIB9","first-page":"15","article-title":"Cryptanalysis of the batch verifying multiple RSA digital signatures","volume":"11","author":"Hwang","year":"2000","journal-title":"Informatica"},{"issue":"3","key":"10.1016\/S0096-3003(02)00500-3_BIB10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S0164-1212(00)00072-8","article-title":"A simple micro-payment scheme","volume":"55","author":"Hwang","year":"2001","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"10.1016\/S0096-3003(02)00500-3_BIB11","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/S0169-023X(01)00048-9","article-title":"Adding timestamps to the secure electronic auction protocol","volume":"40","author":"Hwang","year":"2002","journal-title":"Data & Knowledge Engineering"},{"issue":"2","key":"10.1016\/S0096-3003(02)00500-3_BIB12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0096-3003(02)00500-3_BIB13","unstructured":"Y.-L. Tang, M.-S. Hwang, Y.-C. Lai, Cryptanalysis of a blind signature scheme based on elgamal signature. International Journal of Pure and Applied Mathematics, in press"}],"container-title":["Applied Mathematics and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302005003?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302005003?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T07:41:24Z","timestamp":1583998884000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096300302005003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,12]]},"references-count":13,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2003,12]]}},"alternative-id":["S0096300302005003"],"URL":"https:\/\/doi.org\/10.1016\/s0096-3003(02)00500-3","relation":{},"ISSN":["0096-3003"],"issn-type":[{"value":"0096-3003","type":"print"}],"subject":[],"published":{"date-parts":[[2003,12]]}}}