{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:04Z","timestamp":1750308784729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,11,3]],"date-time":"2006-11-03T00:00:00Z","timestamp":1162512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,3]]},"DOI":"10.1145\/1179529.1179541","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"73-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Using group signatures for identity management and its implementation"],"prefix":"10.1145","author":[{"given":"Toshiyuki","family":"Isshiki","sequence":"first","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]},{"given":"Kengo","family":"Mori","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]},{"given":"Kazue","family":"Sako","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]},{"given":"Isamu","family":"Teranishi","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]},{"given":"Shoko","family":"Yonezawa","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kanagawa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2006,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science Springer-Verlag","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology -- CRYPTO 2000 (Santa Barbara","author":"Ateniese G.","year":"2000","unstructured":"Ateniese , G. , Camenisch , J. , Joye , M. , and Tsudik , G . A practical and provably secure coalition-resistant group signature scheme . In Advances in Cryptology -- CRYPTO 2000 (Santa Barbara , California, USA , August 2000 ), M. Bellare, Ed ., vol. 1880 of Lecture Notes in Computer Science Springer-Verlag , pp. 255 -- 270 .]] Ateniese, G., Camenisch, J., Joye, M., and Tsudik, G. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology -- CRYPTO 2000 (Santa Barbara, California, USA, August 2000), M. Bellare, Ed., vol. 1880 of Lecture Notes in Computer Science Springer-Verlag, pp.255--270.]]"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science Springer-Verlag","first-page":"480","volume-title":"Advances in Cryptology - EUROCRYPT '97 (Konstanz","author":"I\u0107 N., AND PFIZMANN, B.","year":"1997","unstructured":"BAR I\u0107 , N., AND PFIZMANN, B. Collision-free accumulators and fail-stop signature schemes without trees . In Advances in Cryptology - EUROCRYPT '97 (Konstanz , Germany, May 1997 ), W. Fumy, Ed ., vol. 1233 of Lecture Notes in Computer Science Springer-Verlag , pp. 480 -- 494 .]] BARI\u0107, N., AND PFIZMANN, B. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT '97 (Konstanz, Germany, May 1997), W. Fumy, Ed., vol. 1233 of Lecture Notes in Computer Science Springer-Verlag, pp. 480--494.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648184.749735"},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science Springer-Verlag","first-page":"45","volume-title":"California","author":"Boneh D.","year":"2004","unstructured":"Boneh , D. , Boyen , X. , and Shacham , H . Short group signatures.In Advances in Cryptology -- CRYPTO 2004 (Santa Barbara , California , USA, August 2004 ), M. K. Franklin, Ed ., vol. 3152 of Lecture Notes in Computer Science Springer-Verlag , pp. 45 -- 55 .]] Boneh, D., Boyen, X., and Shacham, H. Short group signatures.In Advances in Cryptology -- CRYPTO 2004 (Santa Barbara, California, USA, August 2004), M. K. Franklin, Ed., vol. 3152 of Lecture Notes in Computer Science Springer-Verlag, pp.45--55.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-540-30598-9_9","volume-title":"Security in Communication Networks (SCN2004)","volume":"3352","author":"Camenisch J.","year":"2004","unstructured":"Camenisch , J. , and Groth , J . Group signatures: Better efficiency and new theoretical aspects . In Security in Communication Networks (SCN2004) ( 2004 ), vol. 3352 of Lecture Notes in Computer Science Springer , pp. 120 -- 133 .]] Camenisch, J., and Groth, J. Group signatures: Better efficiency and new theoretical aspects. In Security in Communication Networks (SCN2004) (2004), vol. 3352 of Lecture Notes in Computer Science Springer, pp. 120--133.]]"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science Springer-","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"USA","author":"Camenisch J.","year":"1999","unstructured":"Camenisch , J. , and Michels , M . Separability and efficiency for generic group signature schemes (Extended abstract).In Advances in Cryptology--CRYPTO '99 (Santa Barbara,California , USA , August 1999 ), M. Wiener , Ed .,vol. 1666 of Lecture Notes in Computer Science Springer- Verlag, pp. 413 -- 430 .]] Camenisch, J., and Michels, M. Separability and efficiency for generic group signature schemes (Extended abstract).In Advances in Cryptology--CRYPTO '99 (Santa Barbara,California, USA, August 1999), M. Wiener, Ed.,vol. 1666 of Lecture Notes in Computer Science Springer-Verlag, pp. 413--430.]]"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science Springer-Verlag","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology -- EUROCRYPT '91 (Brighton","author":"Chaum D.","year":"1991","unstructured":"Chaum , D. , and van Heijst , E. Group Signatures . In Advances in Cryptology -- EUROCRYPT '91 (Brighton , UK, April 1991 ), D. Davies, Ed ., vol. 547 of Lecture Notes in Computer Science Springer-Verlag , pp. 257 -- 265 .]] Chaum, D., and van Heijst, E. Group Signatures. In Advances in Cryptology -- EUROCRYPT '91 (Brighton, UK, April 1991), D. Davies, Ed., vol.547 of Lecture Notes in Computer Science Springer-Verlag, pp. 257--265.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_38"},{"key":"e_1_3_2_1_9_1","unstructured":"GMP (The GNU MP Bignum Library) http:\/\/www.swox.com\/gmp\/.]]  GMP (The GNU MP Bignum Library) http:\/\/www.swox.com\/gmp\/.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Handbook of Applied Cryptography CRC Press","author":"Menezes A. J.","year":"1996","unstructured":"Menezes , A. J. , van Oorschot , P. C. , and Vanstone , S. A . Handbook of Applied Cryptography CRC Press , 1996 .]] Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. Handbook of Applied Cryptography CRC Press, 1996.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_22"},{"key":"e_1_3_2_1_12_1","unstructured":"Teranishi I. A group signature -Insecurity of previous schemes and improvement of a previous definition and proposition of a scheme. In ISEC (March 2005) in Japanese.]]  Teranishi I. A group signature -Insecurity of previous schemes and improvement of a previous definition and proposition of a scheme. In ISEC (March 2005) in Japanese.]]"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the second ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179529.1179541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179529.1179541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179529.1179541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,3]]},"references-count":12,"alternative-id":["10.1145\/1179529.1179541","10.1145\/1179529"],"URL":"https:\/\/doi.org\/10.1145\/1179529.1179541","relation":{},"subject":[],"published":{"date-parts":[[2006,11,3]]},"assertion":[{"value":"2006-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}