{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:11:57Z","timestamp":1730272317249,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/iscc.2004.1358438","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T09:34:02Z","timestamp":1103794442000},"page":"407-411 Vol.1","source":"Crossref","is-referenced-by-count":0,"title":["A new efficient ID-based proxy blind signature scheme"],"prefix":"10.1109","author":[{"family":"Weimin Lang","sequence":"first","affiliation":[{"name":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., Hubei, China"}]},{"family":"Yunmeng Tan","sequence":"additional","affiliation":[{"name":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., Hubei, China"}]},{"family":"Zongkai Yang","sequence":"additional","affiliation":[{"name":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., Hubei, China"}]},{"family":"Gan Liu","sequence":"additional","affiliation":[{"name":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., Hubei, China"}]},{"family":"Bing Peng","sequence":"additional","affiliation":[{"name":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., Hubei, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Crypto 2001"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","article-title":"Efficient Algorithms for Pairing-based Cryptosystems","author":"barreto","year":"2002","journal-title":"Advances in Cryptology-Crypto'2002 LNCS 2442"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","article-title":"Short signatures from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Asiacrypt 2001"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","article-title":"Efficient threshold signature, multisignature and blind signature schemes based on the Gap Diffie-Hellman group signature scheme","author":"boldyreva","year":"2003","journal-title":"Public Key Cryptography ? PKC 2003"},{"key":"ref14","first-page":"139","article-title":"A New Fair Micropayment System Based on Hash Chain","author":"yang","year":"2004","journal-title":"Proc IEEE Int'l Conf E-Technology E-Commerce and E-Service (EEE '04)"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0028478","article-title":"Proxy signatures revisited","author":"kim","year":"1997","journal-title":"In Proc of ICICS'97 lnt Conf On information and Communications Security"},{"key":"ref3","first-page":"191","article-title":"Threshold proxy signature schemes","author":"zhang","year":"1997","journal-title":"Proc 1997 Information Security Workshop"},{"key":"ref6","first-page":"241","article-title":"On Zhang's non-repudiable proxy signature schemes","author":"lee","year":"1998","journal-title":"ACISP'98"},{"key":"ref5","first-page":"241","article-title":"Remarks on two non-repudiable proxy signature schemes","author":"sun","year":"1999","journal-title":"Proceedings of 9th National Conference on Information Security"},{"key":"ref8","first-page":"324","article-title":"Implementing the Tate pairing","author":"galbraith","year":"2002","journal-title":"Algorithmic Number Theory Symposium ANTS-V LNCS 2369"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref2","first-page":"48","article-title":"Proxy signatures for delegating signing operation","author":"mambo","year":"1996","journal-title":"Proc 3rd ACM Conference on Computer and Communications Security"},{"key":"ref1","first-page":"1338","article-title":"Proxy signature: Delegation of the power to sign messages","volume":"e79 a","author":"mambo","year":"1996","journal-title":"IEICE Trans Fundamentals"},{"key":"ref9","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Advances in Cryptology-CRYPTO'84"}],"event":{"name":"Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications","start":{"date-parts":[[2004,7,28]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2004,7,1]]}},"container-title":["Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9388\/29803\/01358438.pdf?arnumber=1358438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:47:02Z","timestamp":1709923622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1358438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscc.2004.1358438","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}