{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:29:53Z","timestamp":1772724593783,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61271220"],"award-info":[{"award-number":["61271220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Security Management of Information Content Innovation Base","award":["TS0010303001"],"award-info":[{"award-number":["TS0010303001"]}]},{"DOI":"10.13039\/501100014866","name":"National Engineering Laboratory for Information Content Analysis Technology","doi-asserted-by":"crossref","award":["GT036001"],"award-info":[{"award-number":["GT036001"]}],"id":[{"id":"10.13039\/501100014866","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100007834","name":"Natural Science Foundation of Ningbo","doi-asserted-by":"publisher","award":["2012A610064"],"award-info":[{"award-number":["2012A610064"]}],"id":[{"id":"10.13039\/100007834","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tifs.2014.2386658","type":"journal-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T19:19:58Z","timestamp":1419967198000},"page":"543-557","source":"Crossref","is-referenced-by-count":15,"title":["Periodic $K$ -Times Anonymous Authentication With Efficient Revocation of Violator\u2019s Credential"],"prefix":"10.1109","volume":"10","author":[{"family":"Bin Lian","sequence":"first","affiliation":[]},{"family":"Gongliang Chen","sequence":"additional","affiliation":[]},{"family":"Maode Ma","sequence":"additional","affiliation":[]},{"family":"Jianhua Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"16","article-title":"Statistical zero knowledge protocols to prove modular polynomial relations","author":"fujisaki","year":"1997","journal-title":"Proc Crypto"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.10.031"},{"key":"ref33","first-page":"332","article-title":"Short e-cash","author":"au","year":"2005","journal-title":"Proc Indocrypt"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_25"},{"key":"ref30","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Proc Crypto"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_19"},{"key":"ref36","article-title":"Contribution to privacy-preserving cryptographic techniques","author":"au","year":"2009"},{"key":"ref35","first-page":"275","article-title":"Accumulators from bilinear pairings and applications","author":"nguyen","year":"2005","journal-title":"Proc CT-RSA"},{"key":"ref34","first-page":"178","article-title":"Compact e-cash from bounded accumulator","author":"au","year":"2007","journal-title":"Proc CT-RSA"},{"key":"ref28","first-page":"72","article-title":"Blacklistable anonymous credentials: Blocking misbehaving users without ttps","author":"tsang","year":"2007","journal-title":"Proc 14th ACM CCS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_26"},{"key":"ref29","first-page":"454","article-title":"Solving revocation with efficient update of anonymous credentials","author":"camenisch","year":"2010","journal-title":"Proc 7th SCN"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"ref1","first-page":"93","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","author":"camenisch","year":"2001","journal-title":"Proc EUROCRYPT"},{"key":"ref20","first-page":"237","article-title":"On fair e-cash systems based on group signature schemes","author":"canard","year":"2003","journal-title":"Proc 8th ACIS"},{"key":"ref22","first-page":"75","article-title":"Times limited accountable anonymous online submission control system from single-verifier $k$ -times group signature","volume":"36","author":"zhao","year":"2012","journal-title":"Informatica"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0240-2"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/1030083.1030106","article-title":"Group signatures with verifier-local revocation","author":"boneh","year":"2004","journal-title":"Proceedings of the 11th ACM CCS'04"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5280","article-title":"Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile","author":"cooper","year":"2008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110309"},{"key":"ref25","first-page":"400","article-title":"A practical system for globally revoking the unlinkable pseudonyms of unknown users","author":"brands","year":"2007","journal-title":"Proc ACISP"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref51","first-page":"193","article-title":"Dynamic fully anonymous short group signatures","author":"delerabl\u00e9e","year":"2006","journal-title":"Proceedings of Vietcrypt"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2366741"},{"key":"ref10","first-page":"61","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","author":"camenisch","year":"2002","journal-title":"Proc Crypto"},{"key":"ref11","first-page":"495","article-title":"Efficient proofs for CNF formulas on attributes in pairing-based anonymous credential system","author":"begum","year":"2012","journal-title":"Proc 15th ICIS"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_33"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221931"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2043628.2043630"},{"key":"ref14","first-page":"679","article-title":"PE(AR) $^{2}$ : Privacy-enhanced anonymous authentication with reputation and revocation","author":"yu","year":"2012","journal-title":"Proc ESORICS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73408-6_13"},{"key":"ref16","first-page":"255","article-title":"A practical and provably secure coalition-resistant group signature scheme","author":"ateniese","year":"2000","journal-title":"Proc Crypto"},{"key":"ref17","first-page":"41","article-title":"Short group signatures","author":"boneh","year":"2004","journal-title":"Proc Crypto"},{"key":"ref18","first-page":"571","article-title":"Traceable signatures","author":"kiayias","year":"2004","journal-title":"Proc EUROCRYPT"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47790-X_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_22"},{"key":"ref8","first-page":"302","article-title":"Compact e-cash","author":"camenisch","year":"2005","journal-title":"Proc EUROCRYPT"},{"key":"ref7","first-page":"555","article-title":"Unclonable group identification","author":"damg\u00e5rd","year":"2006","journal-title":"Proc EUROCRYPT"},{"key":"ref49","first-page":"107","article-title":"Proving in zero-knowledge that a number is the product of two safe primes","author":"camenisch","year":"1999","journal-title":"Proc EUROCRYPT"},{"key":"ref9","first-page":"318","article-title":"Dynamic $k$ -times anonymous authentication","author":"nguyen","year":"2005","journal-title":"Proc 3rd ICACNS"},{"key":"ref46","first-page":"416","article-title":"A verifiable random function with short proofs and keys","author":"dodis","year":"2005","journal-title":"Proc 8th PKC"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"ref48","first-page":"268","article-title":"A signature scheme with efficient protocols","author":"camenisch","year":"2002","journal-title":"Proc SCN"},{"key":"ref47","first-page":"514","article-title":"Short signatures from the Weil pairing","author":"boneh","year":"2001","journal-title":"Proc ASIACRYPT"},{"key":"ref42","first-page":"48","article-title":"The decision Diffie&#x2013;Hellman problem","author":"boneh","year":"1998","journal-title":"Proc 3rd ANTS"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref44","article-title":"Group signature schemes and payment systems based on the discrete logarithm problem","author":"camenisch","year":"1998"},{"key":"ref43","first-page":"223","article-title":"Efficient selective-ID secure identity based encryption without random oracles","author":"boneh","year":"2004","journal-title":"Proc EUROCRYPT"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7019030\/06999947.pdf?arnumber=6999947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:55Z","timestamp":1642004875000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":52,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2386658","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}