{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:52Z","timestamp":1750307992586,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128829","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"59-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Designated group credentials"],"prefix":"10.1145","author":[{"given":"Ching Yu","family":"Ng","sequence":"first","affiliation":[{"name":"University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839935"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_35"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830565"},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - Crypto","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-Based Encryption from the Weil Pairing . In Advances in Cryptology - Crypto 2001 , volume 2139 of Lecture Notes in Computer Science , pages 213 -- 229 . Springer-Verlag , 2001.]] D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology - Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213--229. Springer-Verlag, 2001.]]"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - Asiacrypt","author":"Boneh D.","year":"2001","unstructured":"D. Boneh , B. Lynn , and H. Shacham . Short Signatures from the Weil Pairing . In Advances in Cryptology - Asiacrypt 2001 , volume 2248 of Lecture Notes in Computer Science , pages 514 -- 532 . Springer-Verlag , 2001.]] D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. In Advances in Cryptology - Asiacrypt 2001, volume 2248 of Lecture Notes in Computer Science, pages 514--532. Springer-Verlag, 2001.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-30539-2_21","volume-title":"Advances in Cryptology - Asiacrypt","author":"Castelluccia C.","year":"2004","unstructured":"C. Castelluccia , S. Jarecki , and G. Tsudik . Secret Handshakes from CA-Oblivious Encryption . In Advances in Cryptology - Asiacrypt 2004 , volume 3329 of Lecture Notes in Computer Science , pages 293 -- 307 . Springer-Verlag , 2004.]] C. Castelluccia, S. Jarecki, and G. Tsudik. Secret Handshakes from CA-Oblivious Encryption. In Advances in Cryptology - Asiacrypt 2004, volume 3329 of Lecture Notes in Computer Science, pages 293--307. Springer-Verlag, 2004.]]"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","first-page":"458","volume-title":"Advances in Cryptology - Eurocrypt","author":"Chaum D.","year":"1990","unstructured":"D. Chaum . Zero-Knowledge Undeniable Signatures . In Advances in Cryptology - Eurocrypt 1990 , volume 473 of Lecture Notes in Computer Science , pages 458 -- 464 . Springer-Verlag , 1990.]] D. Chaum. Zero-Knowledge Undeniable Signatures. In Advances in Cryptology - Eurocrypt 1990, volume 473 of Lecture Notes in Computer Science, pages 458--464. Springer-Verlag, 1990.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology - Eurocrypt","author":"Jakobsson M.","year":"1996","unstructured":"M. Jakobsson , K. Sako , and R. Impagliazzo . Designated Verifier Proofs and Their Applications . In Advances in Cryptology - Eurocrypt 1996 , volume 1070 of Lecture Notes in Computer Science , pages 143 -- 154 . Springer-Verlag , 1996.]] M. Jakobsson, K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. In Advances in Cryptology - Eurocrypt 1996, volume 1070 of Lecture Notes in Computer Science, pages 143--154. Springer-Verlag, 1996.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872061"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-40061-5_33","volume-title":"Advances in Cryptology - Asiacrypt","author":"Steinfeld R.","year":"2003","unstructured":"R. Steinfeld , L. Bull , H. Wang , and J. Pieprzyk . Universal Designated-Verifier Signatures . In Advances in Cryptology - Asiacrypt 2003 , volume 2894 of Lecture Notes in Computer Science , pages 523 -- 542 . Springer-Verlag , 2003.]] R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal Designated-Verifier Signatures. In Advances in Cryptology - Asiacrypt 2003, volume 2894 of Lecture Notes in Computer Science, pages 523--542. Springer-Verlag, 2003.]]"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-24632-9_7","volume-title":"Public Key Cryptography","author":"Steinfeld R.","year":"2004","unstructured":"R. Steinfeld , H. Wang , and J. Pieprzyk . Efficient Extension of Standard Schnorr\/RSA Signatures into Universal Designated-Verifier Signatures . In Public Key Cryptography 2004 , volume 2947 of Lecture Notes in Computer Science , pages 86 -- 100 . Springer-Verlag , 2004.]] R. Steinfeld, H. Wang, and J. Pieprzyk. Efficient Extension of Standard Schnorr\/RSA Signatures into Universal Designated-Verifier Signatures. In Public Key Cryptography 2004, volume 2947 of Lecture Notes in Computer Science, pages 86--100. Springer-Verlag, 2004.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030105"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":15,"alternative-id":["10.1145\/1128817.1128829","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128829","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}