{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:10:43Z","timestamp":1729660243953,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6024120","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:24:52Z","timestamp":1318436692000},"page":"4827-4831","source":"Crossref","is-referenced-by-count":1,"title":["A novel identity-based signature with message recovery from RSA"],"prefix":"10.1109","author":[{"given":"Xing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"145","article-title":"Identity-Based multi-Signatures from RSA","volume":"4377","author":"bellare","year":"2007","journal-title":"LNCS"},{"key":"18","first-page":"452","article-title":"Certificateless public key cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"LNCS"},{"key":"15","first-page":"268","article-title":"Security proofs for identitybased identification and signature schemes","volume":"3027","author":"bellare","year":"2004","journal-title":"LNCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.08.002"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76969-9_4"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_65"},{"key":"3","first-page":"182","article-title":"Message recovery for signature schemes based on the discrete logarithm problem","volume":"950","author":"nyberg","year":"1995","journal-title":"LNCS"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1049\/el:19981365"},{"key":"1","first-page":"378","article-title":"A signature scheme with message recovery as secure as discrete logarithm","volume":"1716","author":"abe","year":"1999","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/11507840_5","article-title":"Identity-based partial message recovery signatures (or how to shorten ID-based signatures)","volume":"3570","author":"zhang","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"7","first-page":"310","article-title":"Efficient identity based signature schemes based on pairings","volume":"2595","author":"hess","year":"2003","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"5","first-page":"216","article-title":"A paradoxical identity-Based signature scheme resulting from zero-Knowledge","volume":"403","author":"guillou","year":"1990","journal-title":"LNCS"},{"key":"4","first-page":"47","article-title":"Identity-Based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"LNCS"},{"key":"9","first-page":"515","article-title":"Efficient and provably-secure identity-based signatures and signcryption from bilinear maps","volume":"3788","author":"barreto","year":"2005","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"8","first-page":"18","article-title":"An identity-based signature from gap Diffie-Hellman groups","volume":"2567","author":"cha","year":"2003","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"}],"event":{"name":"Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, Heilongjiang, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6023117\/06024120.pdf?arnumber=6024120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:50:41Z","timestamp":1497930641000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6024120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6024120","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}