{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:15:31Z","timestamp":1729610131733,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ftdcs.2004.1316595","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"68-73","source":"Crossref","is-referenced-by-count":0,"title":["An efficient key-evolving signature scheme based on pairing"],"prefix":"10.1109","author":[{"family":"Yuefei Zhu","sequence":"first","affiliation":[]},{"family":"Dan Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A forward-secure public-key encryption scheme Advances in Cryptology- Eurocrypt 03","year":"0","author":"canetti","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref5","article-title":"Threshold Cryptosystems","volume":"435","author":"desmedt","year":"1989","journal-title":"Advances in Cryptology-Crypto 89 Proceedings Lec Notes in Comp Sci"},{"key":"ref8","article-title":"An identity-based key-exchange protocol","volume":"434","author":"g\u00fcnther","year":"1989","journal-title":"Andvances in Cryptology-Eurocrypt 89 Proceedings Lec Notes in Comp Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","article-title":"Hierarchical ID-Based Cryptography","volume":"2502","author":"gentry","year":"2002","journal-title":"Advances in Cryptology-ASIACRYPT 2002"},{"key":"ref2","first-page":"431","article-title":"A forward-secure digital signature scheme","author":"bellare","year":"1999","journal-title":"Proceedings of Advances in Cryptology-Crypto 99 Lecture Notes in Computer Science 1666"},{"key":"ref9","article-title":"Proactive Public key and signature schemes","author":"herzberg","year":"1997","journal-title":"Proceedings of the Fourth Annual Conference on Computer and Communicatins Security"},{"key":"ref1","article-title":"Invited lecture","author":"anderson","year":"1997","journal-title":"Fourth Annual Conference on Computer and Communications Security"}],"event":{"name":"Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004.","location":"Suzhou, China"},"container-title":["Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9202\/29177\/01316595.pdf?arnumber=1316595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T11:52:50Z","timestamp":1497613970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1316595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ftdcs.2004.1316595","relation":{},"subject":[]}}