{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T00:30:56Z","timestamp":1693701056806},"reference-count":15,"publisher":"Elsevier BV","issue":"11","license":[{"start":{"date-parts":[[1997,10,1]],"date-time":"1997-10-01T00:00:00Z","timestamp":875664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1997,10]]},"DOI":"10.1016\/s0140-3664(97)00092-3","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:56:11Z","timestamp":1027637771000},"page":"1019-1026","source":"Crossref","is-referenced-by-count":1,"title":["ID-based group-oriented cryptosystem and its digital signature scheme"],"prefix":"10.1016","volume":"20","author":[{"given":"Tzong-Chen","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ru-Lan","family":"Su","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(97)00092-3_BIB1","author":"Data Encryption Standard","year":"1977"},{"issue":"2","key":"10.1016\/S0140-3664(97)00092-3_BIB2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signature and public-key cryptosystem","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/S0140-3664(97)00092-3_BIB3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public-key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB4","series-title":"Advances in Cryptology\u2014CRYPTO'87","first-page":"120","article-title":"Society and group oriented cryptography: a new concept","author":"Desmedt","year":"1988"},{"issue":"5","key":"10.1016\/S0140-3664(97)00092-3_BIB5","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/49.223873","article-title":"A new generalized group-oriented cryptoscheme without trusted centers","volume":"11","author":"Chang","year":"1993","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB6","series-title":"Advances in Cryptology\u2014CRYPTO'89","first-page":"307","article-title":"Threshold cryptosystems","author":"Desmedt","year":"1990"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB7","series-title":"Advances in Cryptology\u2014CRYPTO'91","first-page":"457","article-title":"Shared generation of authentications and signatures","author":"Desmedt","year":"1992"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB8","series-title":"Advances in Cryptology\u2014EUROCRYPT'89","first-page":"56","article-title":"A practical protocol for large group oriented networks","author":"Frankel","year":"1990"},{"issue":"4","key":"10.1016\/S0140-3664(97)00092-3_BIB9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0020-0190(92)90236-O","article-title":"Protocols for group oriented secret sharing","volume":"42","author":"Hwang","year":"1992","journal-title":"Information Processing Letters"},{"issue":"4","key":"10.1016\/S0140-3664(97)00092-3_BIB10","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1049\/el:19900663","article-title":"Improved digital signature scheme based on discrete exponentiation","volume":"26","author":"Agnew","year":"1990","journal-title":"Electronics Letters"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB11","first-page":"307","article-title":"Group-oriented (t,n threshold digital signature scheme and digital multisignature","volume":"141","author":"Harn","year":"1994"},{"issue":"11","key":"10.1016\/S0140-3664(97)00092-3_BIB12","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of the ACM"},{"issue":"5","key":"10.1016\/S0140-3664(97)00092-3_BIB13","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","article-title":"Hiding information and signatures in trapdoor knapsack","volume":"IT-24","author":"Merkle","year":"1978","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"10.1016\/S0140-3664(97)00092-3_BIB14","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1109\/49.17709","article-title":"An ID-based cryptosystem based on the discrete logarithm problem","volume":"7","author":"Tsujii","year":"1989","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(97)00092-3_BIB15","series-title":"Advances in Cryptology\u2014CRYPTO'84","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"Shamir","year":"1985"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497000923?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497000923?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T23:24:47Z","timestamp":1555197887000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366497000923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,10]]},"references-count":15,"journal-issue":{"issue":"11","published-print":{"date-parts":[[1997,10]]}},"alternative-id":["S0140366497000923"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(97)00092-3","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1997,10]]}}}