{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:27:18Z","timestamp":1762003638651},"reference-count":26,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/s0920-5489(03)00069-2","type":"journal-article","created":{"date-parts":[[2003,6,9]],"date-time":"2003-06-09T16:41:29Z","timestamp":1055176889000},"page":"61-71","source":"Crossref","is-referenced-by-count":24,"title":["Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem"],"prefix":"10.1016","volume":"26","author":[{"given":"Shiang-Feng","family":"Tzeng","sequence":"first","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0920-5489(03)00069-2_BIB1","first-page":"63","article-title":"The limited verifier signature and its application","volume":"E82-A","author":"Araki","year":"1999","journal-title":"IEICE Transactions on Fundamentals"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB2","series-title":"Advances in Cryptology Eurocrypt '96","first-page":"399","article-title":"The exact security of digital signatures: how to sign with rsa and rabin","author":"Bellare","year":"1996"},{"issue":"1","key":"10.1016\/S0920-5489(03)00069-2_BIB3","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/S0167-4048(99)80008-X","article-title":"Pki, elliptic curve cryptography, and digital signatures","volume":"18","author":"Caelli","year":"1999","journal-title":"Computers & Security"},{"issue":"15","key":"10.1016\/S0920-5489(03)00069-2_BIB4","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1049\/el:19960886","article-title":"Parallel computation of the generating keys for RSA cryptosystems","volume":"32","author":"Chang","year":"1996","journal-title":"IEE Electronics Letters"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0164-1212(99)00080-1","article-title":"ElGamal-like digital signature and multisignature schemes using self-certified public keys","volume":"50","author":"Chang","year":"2000","journal-title":"The Journal of Systems and Software"},{"issue":"3","key":"10.1016\/S0920-5489(03)00069-2_BIB6","first-page":"303","article-title":"A batch verifying and detecting multiple RSA digital signatures","volume":"2","author":"Wesley Changchien","year":"2002","journal-title":"International Journal of Computational and Numerical Analysis and Applications"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public-key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB8","series-title":"Advances in Cryptology, EUROCRYPT'91","first-page":"491","article-title":"Self-certified public keys","author":"Girault","year":"1991"},{"issue":"15","key":"10.1016\/S0920-5489(03)00069-2_BIB9","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1049\/el:19940856","article-title":"Authenticated encryption schemes with low communication costs","volume":"30","author":"Horster","year":"1994","journal-title":"Electronics Letters"},{"issue":"2","key":"10.1016\/S0920-5489(03)00069-2_BIB10","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/69.991728","article-title":"An ElGamal-like cryptosystem for enciphering large messages","volume":"14","author":"Hwang","year":"2002","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB11","article-title":"Traceability on RSA-based partially signature with low computation","author":"Hwang","year":"2002","journal-title":"Applied Mathematics and Computation"},{"issue":"4","key":"10.1016\/S0920-5489(03)00069-2_BIB12","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0020-0190(96)00032-4","article-title":"Authenticated encryption schemes with message linkage","volume":"58","author":"Hwang","year":"1996","journal-title":"Information Processing Letters"},{"issue":"177","key":"10.1016\/S0920-5489(03)00069-2_BIB13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Mathematics of Computation"},{"issue":"5","key":"10.1016\/S0920-5489(03)00069-2_BIB14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/S0020-0190(97)00118-X","article-title":"Authenticated encryption schemes with linkage between message blocks","volume":"63","author":"Lee","year":"1997","journal-title":"Information Processing Letters"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB15","unstructured":"A. Menezes, S. Vanstone, Elliptic curve systems, Proposed IEEE P1363 Standard, (1995) 1\u201342."},{"key":"10.1016\/S0920-5489(03)00069-2_BIB16","series-title":"Advances in Cryptology, CRYPTO '85","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"vol. 218","author":"Miller","year":"1985"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB17","series-title":"Advances in Cryptology, ASIACRYPT '96","first-page":"1","article-title":"A message recovery signature scheme equivalent to DSA over elliptic curves","author":"Miyaji","year":"1996"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB18","unstructured":"NITS, Secure hash standard. Tech. Rep. FIPS 180-1, NITS, US Department Commerce, 1995 April."},{"key":"10.1016\/S0920-5489(03)00069-2_BIB19","series-title":"1st ACM Conference on Computer and Communications Security","first-page":"58","article-title":"A new signature scheme based on the DSA giving message recovery","author":"Nyberg","year":"1993"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB20","series-title":"Advances in Cryptology, EUROCRYPT '94","first-page":"175","article-title":"Message recovery for signature schemes based on the discrete logarithm","author":"Nyberg","year":"1994"},{"issue":"1\u20132","key":"10.1016\/S0920-5489(03)00069-2_BIB21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/BF00125076","article-title":"Message recovery for signature schemes based on the discrete logarithm","volume":"7","author":"Nyberg","year":"1996","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"6","key":"10.1016\/S0920-5489(03)00069-2_BIB23","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1049\/ip-cdt:20010780","article-title":"Cryptographic system using a self-certified public key based on discrete logarithms","volume":"148","author":"Shao","year":"2001","journal-title":"IEE Proceedings\u2014Computer Digital Technology"},{"issue":"1","key":"10.1016\/S0920-5489(03)00069-2_BIB24","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/S0045-7906(01)00010-6","article-title":"Authenticated encryption schemes with message linkages for message flows","volume":"29","author":"Tseng","year":"2003","journal-title":"Computers and Electrical Engineering"},{"issue":"2\u20133","key":"10.1016\/S0920-5489(03)00069-2_BIB25","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S0096-3003(02)00010-3","article-title":"Digital signature with message recovery using self-certified public keys and its variants","volume":"136","author":"Tseng","year":"2003","journal-title":"Applied Mathematics and Computation"},{"key":"10.1016\/S0920-5489(03)00069-2_BIB26","series-title":"Proceeding of 9th National Conference on Information Security, R.O.C.","first-page":"303","article-title":"Authenticated encryption schemes with double message linkage","author":"Wu","year":"1999"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000692?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000692?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T17:57:47Z","timestamp":1553104667000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548903000692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S0920548903000692"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(03)00069-2","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}