{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:39:12Z","timestamp":1729672752655,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859785","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1394-1399","source":"Crossref","is-referenced-by-count":6,"title":["Comparison of ID-based blind signatures from pairings for e-voting protocols"],"prefix":"10.1109","author":[{"given":"Pance","family":"Ribarski","sequence":"first","affiliation":[]},{"given":"Ljupcho","family":"Antovski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_21"},{"key":"17","first-page":"312","article-title":"Efficient id-based blind signature and proxy signature","volume":"2727","author":"fangguo","year":"2003","journal-title":"ACISP 2003 LNCS"},{"key":"18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/11599371_11","article-title":"Efficient identity-based signatures and blind signatures","author":"huang","year":"2005","journal-title":"Proceedings of the 4th International Conference on Cryptology and Network Security Ser CANS'05"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt069"},{"key":"16","first-page":"533","article-title":"Id-based blind signature and ring signature from pairings","author":"zhang","year":"2002","journal-title":"Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology Ser ASIACRYPT '02 London"},{"key":"13","first-page":"62","article-title":"Identity based threshold cryptography and blind signatures for electronic voting","volume":"9","author":"gallegos-garc?a","year":"2010","journal-title":"W Trans on Comp"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.198"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICFN.2010.40"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.93"},{"key":"21","first-page":"98","article-title":"An id-based blind signature scheme from bilinear pairings","volume":"4","author":"rao","year":"2010","journal-title":"International Journal of Computer Science and Security"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2008.4717895"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.7.12.909-920"},{"key":"23","article-title":"Panda: Pairings and arithmetic","author":"chuengsatiansup","year":"2013","journal-title":"Pairing-Based Cryptography-Pairing 2013 Ser Lecture Notes in Computer Science"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"25","first-page":"288","article-title":"A generalized birthday problem","author":"wagner","year":"2002","journal-title":"Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology Ser CRYPTO '92"},{"key":"26","first-page":"319","article-title":"The power of rsa inversion oracles and the security of chaums rsa-based blind signature scheme","author":"bellare","year":"2001","journal-title":"Financial Cryptography"},{"key":"27","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/BFb0053458","article-title":"Blind signatures based on the discrete logarithm problem","volume":"950","author":"camenisch","year":"1995","journal-title":"Advances in Cryptology EUROCRYPT' 94 Ser Lecture Notes in Computer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0000437"},{"key":"29","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","article-title":"Efficient identity based signature schemes based on pairings","volume":"2595","author":"hess","year":"2003","journal-title":"Selected Areas in Cryptography Ser Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/2153546"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103434"},{"key":"10","first-page":"293","article-title":"Anonymous secure e-voting over a network","author":"mu","year":"1998","journal-title":"Computer Security Applications Conference 1998 Proceedings 14th Annual"},{"key":"1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1985","journal-title":"Advances in Cryptology Ser Lecture Notes in Computer Science"},{"key":"30","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/11693383_22","article-title":"Pairing-friendly elliptic curves of prime order","volume":"3897","author":"barreto","year":"2006","journal-title":"Selected Areas in Cryptography Ser Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"6","first-page":"514","article-title":"Short signatures from the weil pairing","author":"boneh","year":"2001","journal-title":"Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology Ser ASIACRYPT '01"},{"key":"5","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology Ser CRYPTO '01"},{"key":"4","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","article-title":"A one round protocol for tripartite diffie-hellman","author":"joux","year":"2000","journal-title":"ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory"},{"key":"9","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","article-title":"A practical secret voting scheme for large scale elections","volume":"718","author":"fujioka","year":"1993","journal-title":"Advances in Cryptology AUSCRYPT '92 Ser Lecture Notes in Computer Science"},{"journal-title":"Classification of Blind Signature Schemes and Examples of Hidden and Weak Blind Signatures","year":"1994","author":"horster","key":"8"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859785.pdf?arnumber=6859785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:35:53Z","timestamp":1498152953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859785","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}