{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:51:49Z","timestamp":1762210309408},"reference-count":22,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/s0920-5489(03)00075-8","type":"journal-article","created":{"date-parts":[[2003,7,31]],"date-time":"2003-07-31T22:28:16Z","timestamp":1059690496000},"page":"73-84","source":"Crossref","is-referenced-by-count":26,"title":["Generalization of proxy signature based on elliptic curves"],"prefix":"10.1016","volume":"26","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Shiang-Feng","family":"Tzeng","sequence":"additional","affiliation":[]},{"given":"Chwei-Shyong","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/S0920-5489(03)00075-8_BIB1","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1049\/el:19960886","article-title":"Parallel computation of the generating keys for RSA cryptosystems","volume":"32","author":"Chang","year":"1996","journal-title":"IEE Electronics Letters"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public-key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"issue":"58","key":"10.1016\/S0920-5489(03)00075-8_BIB4","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/S0164-1212(01)00032-2","article-title":"New nonrepudiable threshold proxy signature scheme with known signers","author":"Hsu","year":"2001","journal-title":"The Journal of Systems and Software"},{"issue":"2","key":"10.1016\/S0920-5489(03)00075-8_BIB5","first-page":"1","article-title":"A secure nonrepudiable threshold proxy signature scheme with known signers","volume":"11","author":"Hwang","year":"2000","journal-title":"International Journal of Informatica"},{"issue":"2","key":"10.1016\/S0920-5489(03)00075-8_BIB6","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/30.793411","article-title":"A water-marking technique based on one-way hash functions","volume":"45","author":"Hwang","year":"1999","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"10.1016\/S0920-5489(03)00075-8_BIB7","first-page":"1181","article-title":"Traceability on low-computation partially blind signatures for electronic cash","volume":"E85-A","author":"Hwang","year":"2002","journal-title":"IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB8","article-title":"Traceability on RSA-based partially signature with low computation","author":"Hwang","year":"2002","journal-title":"Applied Mathematics and Computation"},{"issue":"3","key":"10.1016\/S0920-5489(03)00075-8_BIB9","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3923\/jas.2001.287.288","article-title":"Cryptanalysis of the batch verifying multiple DSA-type digital signatures","volume":"1","author":"Hwang","year":"2001","journal-title":"Pakistan Journal of Applied Sciences"},{"issue":"1","key":"10.1016\/S0920-5489(03)00075-8_BIB10","first-page":"15","article-title":"Cryptanalysis of the batch verifying multiple RSA digital signatures","volume":"11","author":"Hwang","year":"2000","journal-title":"Informatica"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB11","article-title":"A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem","author":"Hwang","year":"2002","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB12","series-title":"Proc. of ICICS'97","first-page":"223","article-title":"Proxy signatures, revisited","volume":"vol. 1334","author":"Kim","year":"1997"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB13","series-title":"ACISP'98","first-page":"415","article-title":"On Zhang's nonrepudiable proxy signature schemes","volume":"vol. 1438","author":"Lee","year":"1998"},{"issue":"4","key":"10.1016\/S0920-5489(03)00075-8_BIB14","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1049\/el:20000327","article-title":"Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities","volume":"36","author":"Li","year":"2000","journal-title":"Electronics Letters"},{"issue":"5","key":"10.1016\/S0920-5489(03)00075-8_BIB15","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","article-title":"Reducing elliptic curve logarithms to logarithms in a finite field","volume":"39","author":"Menezes","year":"1993","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB16","series-title":"Advances in Cryptology, CRYPTO'85","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"vol. 218","author":"Miller","year":"1985"},{"issue":"7","key":"10.1016\/S0920-5489(03)00075-8_BIB17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/129902.129904","article-title":"The digital signature standard proposed by NIST","volume":"35","author":"National Institute of Standards and Technology (NIST)","year":"1992","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"8","key":"10.1016\/S0920-5489(03)00075-8_BIB19","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/S0140-3664(99)00029-8","article-title":"An efficient nonrepudiable threshold proxy signature scheme with known signers","volume":"22","author":"Sun","year":"1999","journal-title":"Computer Communications"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB20","series-title":"Proceeding of 12th National Conference on Information Security","first-page":"285","article-title":"A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification","author":"Tzeng","year":"2002"},{"issue":"6","key":"10.1016\/S0920-5489(03)00075-8_BIB21","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1049\/el:20000422","article-title":"Proxy multi-signature scheme: a new type of proxy signature scheme","volume":"36","author":"Yi","year":"2000","journal-title":"Electronics Letters"},{"key":"10.1016\/S0920-5489(03)00075-8_BIB22","series-title":"1997 Information Security Workshop","first-page":"191","article-title":"Threshold proxy signature schemes","author":"Zhang","year":"1997"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000758?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000758?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T08:21:29Z","timestamp":1552810889000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548903000758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S0920548903000758"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(03)00075-8","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}