{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:42:43Z","timestamp":1777372963527,"version":"3.51.4"},"reference-count":23,"publisher":"Oxford University Press (OUP)","license":[{"start":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T00:00:00Z","timestamp":1523318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1093\/computer_journal\/bxy036","type":"journal-article","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:53:59Z","timestamp":1523343239000},"source":"Crossref","is-referenced-by-count":3,"title":["Non-interactive Conditional Proxy Re-Signature in the Standard Model"],"prefix":"10.1093","author":[{"given":"Eunsung","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea"}]},{"given":"Sang Woo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, POSTECH, Pohang, Gyungbuk 37673, Republic of Korea"}]}],"member":"286","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"key":"key\n\t\t\t\t20180410030348_bxy036C1","author":"Blaze","year":"1998"},{"key":"key\n\t\t\t\t20180410030348_bxy036C2","author":"Ateniese","year":"2005"},{"key":"key\n\t\t\t\t20180410030348_bxy036C3","author":"Shao","year":"2007"},{"key":"key\n\t\t\t\t20180410030348_bxy036C4","author":"Chow","year":"2008"},{"key":"key\n\t\t\t\t20180410030348_bxy036C5","author":"Libert","year":"2008"},{"key":"key\n\t\t\t\t20180410030348_bxy036C6","first-page":"8","article-title":"Remark on Shao et al.\u2019s bidirectional proxy re-signature scheme in Indocrypt\u201907","volume":"9","author":"Kim","year":"2009","journal-title":"Int. J. Netw. Secur."},{"key":"key\n\t\t\t\t20180410030348_bxy036C7","author":"Shao","year":"2010"},{"key":"key\n\t\t\t\t20180410030348_bxy036C8","author":"Shao","year":"2011"},{"key":"key\n\t\t\t\t20180410030348_bxy036C9","first-page":"1199","article-title":"ID-based proxy re-signature with aggregate property","volume":"31","author":"Wang","year":"2015","journal-title":"J. Inf. Sci. Eng."},{"key":"key\n\t\t\t\t20180410030348_bxy036C10","author":"Zhang","year":"2009"},{"key":"key\n\t\t\t\t20180410030348_bxy036C11","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.ipl.2014.12.002","article-title":"Identity-based proxy re-signatures from lattices","volume":"115","author":"Tian","year":"2015","journal-title":"Inf. Process. Lett."},{"key":"key\n\t\t\t\t20180410030348_bxy036C12","author":"Xiao","year":"2013"},{"key":"key\n\t\t\t\t20180410030348_bxy036C13","doi-asserted-by":"crossref","first-page":"5615","DOI":"10.1002\/sec.1721","article-title":"Multi-use unidirectional lattice-based proxy re-signatures in standard model","volume":"9","author":"Xie","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180410030348_bxy036C14","author":"Wang","year":"2015"},{"key":"key\n\t\t\t\t20180410030348_bxy036C15","author":"Vivek","year":"2015"},{"key":"key\n\t\t\t\t20180410030348_bxy036C16","author":"Bellare","year":"1993"},{"key":"key\n\t\t\t\t20180410030348_bxy036C17","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1002\/sec.515","article-title":"Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy","volume":"5","author":"Xiong","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180410030348_bxy036C18","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","article-title":"An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications","volume":"59","author":"Sun","year":"2010","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"key\n\t\t\t\t20180410030348_bxy036C19","first-page":"92","volume-title":"IEEE Trans. Serv. Comput.","author":"Wang","year":"2015"},{"key":"key\n\t\t\t\t20180410030348_bxy036C20","doi-asserted-by":"crossref","first-page":"1796","DOI":"10.4304\/jcp.7.7.1796-1800","article-title":"A novel unidirectional proxy re-signature scheme and its application for MANETs","volume":"7","author":"Hong","year":"2012","journal-title":"J. Comput."},{"key":"key\n\t\t\t\t20180410030348_bxy036C21","author":"Canetti","year":"2007"},{"key":"key\n\t\t\t\t20180410030348_bxy036C22","author":"Waters","year":"2005"},{"key":"key\n\t\t\t\t20180410030348_bxy036C23","author":"Paterson","year":"2006"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/advance-article-pdf\/doi\/10.1093\/computer_journal\/bxy036\/24583451\/bxy036.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T07:03:53Z","timestamp":1523343833000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/advance-article\/doi\/10.1093\/computer_journal\/bxy036\/4965847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1093\/computer_journal\/bxy036","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,10]]}}}