{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:22:11Z","timestamp":1743265331643,"version":"3.28.0"},"reference-count":19,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2008,12,8]]},"DOI":"10.1049\/iet-ifs:20070091","type":"journal-article","created":{"date-parts":[[2008,12,6]],"date-time":"2008-12-06T23:03:05Z","timestamp":1228604585000},"page":"99-107","source":"Crossref","is-referenced-by-count":10,"title":["Analysis of bilinear pairing-based accumulator for identity escrowing"],"prefix":"10.1049","volume":"2","author":[{"given":"C.","family":"Tartary","sequence":"first","affiliation":[{"name":"Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore"}]},{"given":"S.","family":"Zhou","sequence":"additional","affiliation":[{"name":"SKLOIS Lab, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China"}]},{"given":"D.","family":"Lin","sequence":"additional","affiliation":[{"name":"SKLOIS Lab, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, People's Republic of China"}]},{"given":"H.","family":"Wang","sequence":"additional","affiliation":[{"name":"Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore"}]},{"given":"J.","family":"Pieprzyk","sequence":"additional","affiliation":[{"name":"Centre for Advanced Computing \u2013 Algorithms and Cryptography, Department of Computing, Macquarie University, NSW 2109, Australia"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20070091_r1","first-page":"274","author":"Benaloh","year":"1993","journal-title":"Advances in Cryptology \u2013 Eurocrypt'93"},{"key":"10.1049\/iet-ifs:20070091_r2","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","author":"Baric\u0301","year":"1997","journal-title":"\u2018Advances in Cryptology \u2013 Eurocrypt'97\u2019"},{"key":"10.1049\/iet-ifs:20070091_r3","first-page":"609","author":"Dodis","year":"2004","journal-title":"\u2018Advances in Cryptology \u2013 Eurocrypt'04\u2019"},{"journal-title":"Network and Distributed Systems Security Symposium (NDSS)","year":"2004","author":"Karlof","key":"10.1049\/iet-ifs:20070091_r4"},{"key":"10.1049\/iet-ifs:20070091_r5","doi-asserted-by":"crossref","unstructured":"Camenisch, J., and Lysyanskaya, A.: \u2018Dynamic accumulators and application to efficient revocation of anonymous credentials\u2019, (Advances in Cryptology \u2013 Crypto'02, Santa Barbara, USA 2002 August), p. 61\u201376 (LNCS,2442)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"10.1049\/iet-ifs:20070091_r6","doi-asserted-by":"crossref","unstructured":"Nguyen, L.: \u2018Accumulators from bilinear pairings and applications\u2019, (Topics in Cryptology CT-RSA 2005, San Francisco, USA 2005 February), p. 275\u2013292 (LNCS,3376","DOI":"10.1007\/978-3-540-30574-3_19"},{"year":"2006","author":"Nguyen","key":"10.1049\/iet-ifs:20070091_r7"},{"key":"10.1049\/iet-ifs:20070091_r8","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A.: \u2018Handbook of applied cryptography\u2019, (CRC Press 1996)"},{"year":"2006","author":"Nguyen","key":"10.1049\/iet-ifs:20070091_r9"},{"key":"10.1049\/iet-ifs:20070091_r10","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","author":"Chaum","year":"1991","journal-title":"\u2018Advances in Cryptology \u2013 Eurocrypt'91\u2019"},{"key":"10.1049\/iet-ifs:20070091_r11","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/BFb0055727","author":"Kilian","year":"1998","journal-title":"\u2018Advances in Cryptology \u2013 Crypto'98\u2019"},{"year":"2005","author":"Zhang","key":"10.1049\/iet-ifs:20070091_r12"},{"key":"10.1049\/iet-ifs:20070091_r13","doi-asserted-by":"crossref","unstructured":"Pieprzyk, J., Hardjono, T., and Seberry, J.: \u2018Fundamentals of computer security\u2019, (Springer 2003)","DOI":"10.1007\/978-3-662-07324-7"},{"key":"10.1049\/iet-ifs:20070091_r14","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","author":"Ateniese","year":"2000","journal-title":"\u2018Advances in cryptology \u2013 Crypto'00\u2019"},{"key":"10.1049\/iet-ifs:20070091_r15","doi-asserted-by":"crossref","unstructured":"Cao, Z.: \u2018Analysis of one popular group signature scheme\u2019, (Advances in Cryptology \u2013 Asiacrypt'06, Shanghai, China 2006 December), p. 460\u2013466 (LNCS,4284)","DOI":"10.1007\/11935230_30"},{"key":"10.1049\/iet-ifs:20070091_r16","unstructured":"\u2018Remarks on \u201cAnalysis of One Popular Group Signature Scheme\u201d in asiacrypt 2006\u2019, Cryptology ePrint Archive, Report 2006\/464, December, 2006 Available online at: http:\/\/www.eprint.iacr.org\/2006\/464.pdf"},{"key":"10.1049\/iet-ifs:20070091_r17","first-page":"458","author":"Boldyreva","year":"2007","journal-title":"(PKC 2007)"},{"key":"10.1049\/iet-ifs:20070091_r18","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., and Shacham, H.: \u2018Short signatures from the Weil pairing\u2019, (Advances in Cryptology \u2013 Asiacrypt'01 2001 December),Gold Coast, Australia p. 514\u2013532 (LNCS,2248)","DOI":"10.1007\/3-540-45682-1_30"},{"year":"2006","author":"Ateniese","key":"10.1049\/iet-ifs:20070091_r19"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20070091?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:07:22Z","timestamp":1731427642000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20070091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,8]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,12,8]]}},"alternative-id":["10.1049\/iet-ifs:20070091"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20070091","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2008,12,8]]}}}