{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:24Z","timestamp":1750308264275,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T00:00:00Z","timestamp":1100390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,11,14]]},"DOI":"10.1145\/1046290.1046299","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"38-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Provably secure delegation-by-certification proxy signature schemes"],"prefix":"10.1145","author":[{"given":"Zuowen","family":"Tan","sequence":"first","affiliation":[{"name":"Academy of Science, Beijing, China"}]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[{"name":"Academy of Science, AMSS, China"}]}],"member":"320","published-online":{"date-parts":[[2004,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Proceedings of Asiacrypt","author":"Boneh D.","year":"2001","unstructured":"D. Boneh , B. Lynn and H. Shacham . Short Signatures from the Weil Pairiing . In Proceedings of Asiacrypt 2001 , Lecture Notes in Computer Science , Springer-Verlag , Vol . 2248, pp. 514 -- 532 , 2001.]] D. Boneh, B. Lynn and H. Shacham. Short Signatures from the Weil Pairiing. In Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2248, pp. 514--532, 2001.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"A. Boldyreva A. Palacio B. Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights. At:http:\/\/eprint.iacr.org\/2003\/096.]]  A. Boldyreva A. Palacio B. Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights. At:http:\/\/eprint.iacr.org\/2003\/096.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"International workshop on cryptology and network security","author":"Hwang S. J.","year":"2001","unstructured":"S. J. Hwang and C. C. Chen . A new proxy multi-signature scheme . In International workshop on cryptology and network security , Tamkang University, Taipei, Taiwan , Sep. 26-28, 2001 .]] S. J. Hwang and C. C. Chen. A new proxy multi-signature scheme. In International workshop on cryptology and network security, Tamkang University, Taipei, Taiwan, Sep. 26-28, 2001.]]"},{"key":"e_1_3_2_1_4_1","first-page":"134","volume-title":"Proceedings of the Tenth National Conference on Information Security","author":"Hwang S. J.","year":"2000","unstructured":"S. J. Hwang and C. H. Shi . A simple multi-proxy signature scheme . In Proceedings of the Tenth National Conference on Information Security , pp. 134 -- 138 , 2000 .]] S. J. Hwang and C. H. Shi. A simple multi-proxy signature scheme. In Proceedings of the Tenth National Conference on Information Security, pp. 134--138, 2000.]]"},{"key":"e_1_3_2_1_5_1","first-page":"289","volume-title":"Proc. A CISP 2000","author":"Kotzanikolaous P.","year":"1841","unstructured":"P. Kotzanikolaous , M. Burmester , and V. Chrisskopoulos . Secure transactions with mobile agent in hostile environments . In Proc. A CISP 2000 , Lecture Notes in Computer Science 1841 , Springer-Verlag, pp. 289 -- 297 , 2000.]] P. Kotzanikolaous, M. Burmester, and V. Chrisskopoulos. Secure transactions with mobile agent in hostile environments. In Proc. A CISP 2000, Lecture Notes in Computer Science 1841, Springer-Verlag, pp. 289--297, 2000.]]"},{"key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Secrets for mobile agent using one-time proxy signature","volume":"2001","author":"Kim H.","year":"2001","unstructured":"H. Kim , J. Baek , B. Lee , and K. Kim . Secrets for mobile agent using one-time proxy signature . Cryptography and Information Security 2001 , Vol 2\/ 2 , pp. 845--850, 2001 .]] H. Kim, J. Baek, B. Lee, and K. Kim. Secrets for mobile agent using one-time proxy signature. Cryptography and Information Security 2001, Vol 2\/2, pp. 845--850, 2001.]]","journal-title":"Cryptography and Information Security"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science 1334","first-page":"223","volume-title":"revisited. ICICS'97","author":"Kim S. J.","unstructured":"S. J. Kim , S. J. Park , D. H. Won . Proxy Signatures , revisited. ICICS'97 , Lecture Notes in Computer Science 1334 , pp. 223 -- 232 , Springer-Verlag .]] S. J. Kim, S. J. Park, D. H. Won. Proxy Signatures, revisited. ICICS'97, Lecture Notes in Computer Science 1334, pp. 223--232, Springer-Verlag.]]"},{"key":"e_1_3_2_1_8_1","first-page":"273","volume-title":"Pro. of International Conference on Chinese Language Computing","author":"Lin W.D.","year":"2000","unstructured":"W.D. Lin and J. K. Jan . A security personal learning tools using a proxy blind signature scheme . In Pro. of International Conference on Chinese Language Computing , Illinois, USA , July 2000 , pp. 273 -- 277 , 2000.]] W.D. Lin and J. K. Jan. A security personal learning tools using a proxy blind signature scheme. In Pro. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, pp. 273--277, 2000.]]"},{"key":"e_1_3_2_1_9_1","first-page":"603","volume-title":"Proceedings of SCIS","author":"Lee B.","year":"2001","unstructured":"B. Lee , H. Kim , and K. Kim . Strong proxy signgture and its applications . In Proceedings of SCIS , 2001 , pp. 603 -- 608 .]] B. Lee, H. Kim, and K. Kim. Strong proxy signgture and its applications. In Proceedings of SCIS, 2001, pp. 603--608.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646038.678179"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238185"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646279.687368"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00029-8"},{"key":"e_1_3_2_1_14_1","volume-title":"AISW2004","volume":"32","author":"H.","unstructured":"H. -M Sun and B.-T Hsieh. On the security of some proxy blind signature schemes . In AISW2004 , Dunedin, New Zealand. Conferences in Research and Practice in Information Technology , Vol. 32 .]] H.-M Sun and B.-T Hsieh. On the security of some proxy blind signature schemes. In AISW2004, Dunedin, New Zealand. Conferences in Research and Practice in Information Technology, Vol. 32.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"H. M. Sun and B.-T. Hsieh. On the security of some proxy signature scheme. At:http:\/\/eprint.iacr.org\/2003\/068.]]  H. M. Sun and B.-T. Hsieh. On the security of some proxy signature scheme. At:http:\/\/eprint.iacr.org\/2003\/068.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19990647"},{"key":"e_1_3_2_1_17_1","first-page":"1931","article-title":"Proxy blind signature scheme based on DLP","volume":"2003","author":"Tan Z.-W.","year":"2003","unstructured":"Z.-W. Tan , Z.-J. Liu . Proxy blind signature scheme based on DLP . Journal of Software , 2003\/14 , pp. 1931 -- 1935 , 2003 .]] Z.-W. Tan, Z.-J. Liu. Proxy blind signature scheme based on DLP. Journal of Software, 2003\/14, pp. 1931--1935, 2003.]]","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_18_1","volume-title":"Security Analysis of Some Proxy Signatures. In Information Security and Cryptology - ICISC 2003","author":"Wang Guilin","year":"2004","unstructured":"Guilin Wang , Feng Bao , Jianying Zhou , and Robert H . Deng . Security Analysis of Some Proxy Signatures. In Information Security and Cryptology - ICISC 2003 , Springer- Verlag , 2004 .]] Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Security Analysis of Some Proxy Signatures. In Information Security and Cryptology - ICISC 2003, Springer- Verlag, 2004.]]"},{"key":"e_1_3_2_1_19_1","first-page":"507","volume-title":"ASIACRYPT 2003","author":"Wang Huaxion","year":"2004","unstructured":"Huaxion Wang and Josef Pieprzyk . Efficient One-time proxy signatures . In ASIACRYPT 2003 , pp. 507 -- 522 , 2004 , Springer- Verlag.]] Huaxion Wang and Josef Pieprzyk. Efficient One-time proxy signatures. In ASIACRYPT 2003, pp. 507--522, 2004, Springer- Verlag.]]"},{"key":"e_1_3_2_1_20_1","first-page":"191","volume-title":"1997 Information Security Workshop","author":"Zhang K.","year":"1997","unstructured":"K. Zhang . Threshold proxy signature schemes . In 1997 Information Security Workshop , Japan , pp. 191 -- 197 , 1997 .]] K. Zhang. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, pp. 191--197, 1997.]]"}],"event":{"name":"INFOSECU04: International Conference on Information Security","sponsor":["ACM Association for Computing Machinery","SCS Shanghai Computer Society","CCF China Computer Federation"],"location":"Shanghai China","acronym":"INFOSECU04"},"container-title":["Proceedings of the 3rd international conference on Information security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1046290.1046299","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1046290.1046299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:54Z","timestamp":1750267434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1046290.1046299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,11,14]]},"references-count":20,"alternative-id":["10.1145\/1046290.1046299","10.1145\/1046290"],"URL":"https:\/\/doi.org\/10.1145\/1046290.1046299","relation":{},"subject":[],"published":{"date-parts":[[2004,11,14]]},"assertion":[{"value":"2004-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}