{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:15:36Z","timestamp":1775736936796,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030106","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"168-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":350,"title":["Group signatures with verifier-local revocation"],"prefix":"10.1145","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[{"name":"Stanford University"}]},{"given":"Hovav","family":"Shacham","sequence":"additional","affiliation":[{"name":"Stanford University"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS pages 255--70","volume-title":"A practical and provably secure coalition-resistant group signature scheme","author":"Ateniese G.","year":"2000","unstructured":"G. Ateniese , J. Camenisch , M. Joye ,and G. Tsudik . A practical and provably secure coalition-resistant group signature scheme . In M. Bellare,editor, Proceedings of Crypto 2000 volume 1880 of LNCS pages 255--70 . Springer-Verlag , Aug.2000.]] G.Ateniese,J.Camenisch, M. Joye,and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare,editor, Proceedings of Crypto 2000 volume 1880 of LNCS pages 255--70. Springer-Verlag, Aug.2000.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Financial Cryptography 2002","author":"Ateniese G.","year":"2002","unstructured":"G. Ateniese , G. Tsudik ,and D. Song . Quasi-efficient revocation of group signatures. In M.Blaze, editor , Proceedings of Financial Cryptography 2002 Mar. 2002 .]] G.Ateniese,G.Tsudik,and D.Song.Quasi-efficient revocation of group signatures. In M.Blaze, editor, Proceedings of Financial Cryptography 2002 Mar. 2002.]]"},{"key":"e_1_3_2_1_3_1","first-page":"480","volume-title":"Proceedings of Eurocrypt 1997","author":"Baric N.","year":"1997","unstructured":"N. Baric and B. Pfitzman . Collision-free accumulators and fail-stop signature schemes with out trees . In Proceedings of Eurocrypt 1997 pages 480 -- 494 . Springer-Verlag , May 1997 .]] N. Baric and B. Pfitzman. Collision-free accumulators and fail-stop signature schemes with out trees. In Proceedings of Eurocrypt 1997 pages 480--494. Springer-Verlag, May 1997.]]"},{"key":"e_1_3_2_1_4_1","series-title":"LNCS pages 614--29","volume-title":"Proceedings of Eurocrypt 2003","author":"Bellare M.","year":"2003","unstructured":"M. Bellare , D. Micciancio ,and B. Warinschi . Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions . In E. Biham, editor, Proceedings of Eurocrypt 2003 volume 2656 of LNCS pages 614--29 . Springer-Verlag , May 2003 .]] M. Bellare, D. Micciancio,and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, Proceedings of Eurocrypt 2003 volume 2656 of LNCS pages 614--29. Springer-Verlag,May 2003.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS pages 41--55","volume-title":"Proceedings of Crypto 2004","author":"D. Bone","year":"2004","unstructured":"D. Bone , X. Boyen ,and H. Shacham . Short group signatures . In M. Franklin, editor, Proceedings of Crypto 2004 volume 3152 of LNCS pages 41--55 . Springer-Verlag , Aug . 2004 .]] D. Bone ,X. Boyen,and H. Shacham. Short group signatures. In M. Franklin, editor, Proceedings of Crypto 2004 volume 3152 of LNCS pages 41--55. Springer-Verlag, Aug.2004.]]"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS pages 514--32","volume-title":"Short signatures from the Weil pairing.In Proceedings of Asiacrypt 2001","author":"Bone D.","year":"2001","unstructured":"D. Bone , B. Lynn ,and H. Shacham . Short signatures from the Weil pairing.In Proceedings of Asiacrypt 2001 volume 2248 of LNCS pages 514--32 . Springer-Verlag , Dec . 2001 . Full paper: http:\/\/crypto.stanford.edu\/ dabo\/pubs.html]] D.Bone, B. Lynn,and H. Shacham. Short signatures from the Weil pairing.In Proceedings of Asiacrypt 2001 volume 2248 of LNCS pages 514--32. Springer-Verlag, Dec.2001. Full paper: http:\/\/crypto.stanford.edu\/ dabo\/pubs.html]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Apr.","author":"Brickell E.","year":"2003","unstructured":"E. Brickell . An eficient protocol for anonymously providing assurance of the container of a private key , Apr. 2003 . Submitted to the Trusted Computing Group .]] E.Brickell. An eficient protocol for anonymously providing assurance of the container of a private key, Apr. 2003. Submitted to the Trusted Computing Group.]]"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS pages 61--76","volume-title":"Proceedings of Crypto 2002","author":"Camenisc J.","year":"2002","unstructured":"J. Camenisc and A. Lysyanskaya . Dynamic accumulators and application to eficient revocation of anonymous credentials . In M. Yung, editor, Proceedings of Crypto 2002 volume 2442 of LNCS pages 61--76 . Springer-Verlag , Aug . 2002 .]] J. Camenisc and A. Lysyanskaya. Dynamic accumulators and application to eficient revocation of anonymous credentials. In M. Yung, editor, Proceedings of Crypto 2002 volume 2442 of LNCS pages 61--76. Springer-Verlag, Aug.2002.]]"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS pages 257--65","volume-title":"Proceedings of Eurocrypt 1991","author":"D.Chaum and E.van Heyst.Group signatures.","year":"1991","unstructured":"D.Chaum and E.van Heyst.Group signatures. In D. W. Davies, editor, Proceedings of Eurocrypt 1991 volume 547 of LNCS pages 257--65 . Springer-Verlag , Apr. 1991 .]] D.Chaum and E.van Heyst.Group signatures. In D. W. Davies, editor, Proceedings of Eurocrypt 1991 volume 547 of LNCS pages 257--65. Springer-Verlag, Apr. 1991.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of ICDCS 2004","author":"Ding X.","year":"2004","unstructured":"X. Ding , G. Tsudik ,and S. Xu . Leak-free group signatures wit immediate revocation. In T. Lai and K. Okada, editors , Proceedings of ICDCS 2004 Mar. 2004 .]] X. Ding, G. Tsudik,and S. Xu. Leak-free group signatures wit immediate revocation. In T. Lai and K. Okada, editors, Proceedings of ICDCS 2004 Mar. 2004.]]"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS pages 186--194","volume-title":"Proceedings of Crypto 1986","author":"Fiat A.","year":"1986","unstructured":"A. Fiat and A.S amir.How to prove yourself : Practical solutions to identification and signature problems . In A. M. Odlyzko, editor, Proceedings of Crypto 1986 volume 263 of LNCS pages 186--194 . Springer-Verlag , Aug. 1986 .]] A.Fiat and A.S amir.How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Proceedings of Crypto 1986 volume 263 of LNCS pages 186--194. Springer-Verlag,Aug.1986.]]"},{"key":"e_1_3_2_1_14_1","series-title":"LNCS pages 571--89","volume-title":"C. Cachin and J. Camenisch","author":"Kiayias A.","year":"2004","unstructured":"A. Kiayias , Y. Tsiounis ,and M. Yung . Traceable signatures . In C. Cachin and J. Camenisch ,editors, Proceedings of Eurocrypt 2004 volume 3027 of LNCS pages 571--89 . Springer-Verlag , May 2004.]] A. Kiayias, Y. Tsiounis,and M. Yung. Traceable signatures. In C. Cachin and J. Camenisch,editors, Proceedings of Eurocrypt 2004 volume 3027 of LNCS pages 571--89. Springer-Verlag, May 2004.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"S. Mitsunari R. Sakai and M. Kasahara. A new traitor tracing.IEICE Trans. Fundamentals E85-A(2):481--4 Feb.2002.]]  S. Mitsunari R. Sakai and M. Kasahara. A new traitor tracing.IEICE Trans. Fundamentals E85-A(2):481--4 Feb.2002.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"May","author":"Miyaji A.","year":"2001","unstructured":"A. Miyaji , M. Nakabayashi ,and S. Takano . New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals E84-A(5):1234--43 , May 2001 .]] A. Miyaji,M. Nakabayashi,and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals E84-A(5):1234--43, May 2001.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS pages 256--66","volume-title":"Lower bounds for discrete logarithms and related problems.In W.Fumy","author":"Shoup V.","year":"1997","unstructured":"V. Shoup . Lower bounds for discrete logarithms and related problems.In W.Fumy ,editor,Proceedings of Eurocrypt 1997 volume 1233 of LNCS pages 256--66 . Springer-Verlag ,May 1997.]] V.Shoup. Lower bounds for discrete logarithms and related problems.In W.Fumy,editor,Proceedings of Eurocrypt 1997 volume 1233 of LNCS pages 256--66. Springer-Verlag,May 1997.]]"},{"key":"e_1_3_2_1_20_1","volume-title":"Trusted Computing Platform Alliance (TCPA) Main Specification","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . Trusted Computing Platform Alliance (TCPA) Main Specification , 2003 . Online :www.trustedcomputinggroup.org]] Trusted Computing Group. Trusted Computing Platform Alliance (TCPA) Main Specification, 2003. Online:www.trustedcomputinggroup.org]]"},{"key":"e_1_3_2_1_21_1","series-title":"LNCS pages 269--86","volume-title":"Proceedings of Asiacrypt 2003","author":"Tsudik G.","year":"2003","unstructured":"G. Tsudik and S. Xu . Accumulating composites and improved group signing . In C. S. Laih, editor, Proceedings of Asiacrypt 2003 volume 2894 of LNCS pages 269--86 . Springer-Verlag , Dec . 2003 .]] G. Tsudik and S. Xu. Accumulating composites and improved group signing. In C. S. Laih, editor, Proceedings of Asiacrypt 2003 volume 2894 of LNCS pages 269--86. Springer-Verlag, Dec.2003.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":21,"alternative-id":["10.1145\/1030083.1030106","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030106","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}