{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:51Z","timestamp":1750309191117,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"],"award-info":[{"award-number":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"],"award-info":[{"award-number":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"],"award-info":[{"award-number":["CCF-0311510CCF-0728937CNS-0303577CNS-0831186IIS-0324846"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:p>We introduce a decentralized delegation model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and transmission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new digital signature scheme that supports both signer anonymity and signature aggregation. Our scheme has compact role signatures that make it especially suitable for ubiquitous computing environments, where users may have mobile computing devices with narrow communication bandwidth and small storage units.<\/jats:p>","DOI":"10.1145\/1455526.1455528","type":"journal-article","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T13:01:58Z","timestamp":1233752518000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Compact and Anonymous Role-Based Authorization Chain"],"prefix":"10.1145","volume":"12","author":[{"given":"Danfeng","family":"Yao","sequence":"first","affiliation":[{"name":"Rutgers University"}]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[{"name":"Brown University"}]}],"member":"320","published-online":{"date-parts":[[2009,1]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319718"},{"volume-title":"Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS\u201905)","author":"Aringhieri R.","key":"e_1_2_1_2_1","unstructured":"Aringhieri , R. , Damiani , E. , De Capitani di Vimercati, S., and Samarati , P . 2005. Assessing efficiency of trust management in peer-to-peer systems . In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS\u201905) . Aringhieri, R., Damiani, E., De Capitani di Vimercati, S., and Samarati, P. 2005. Assessing efficiency of trust management in peer-to-peer systems. In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS\u201905)."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201900)","volume":"1880","author":"Ateniese G.","unstructured":"Ateniese , G. , Camenisch , J. , Joye , M. , and Tsudik , G . 2000. A practical and provably secure coalition-resistant group signature scheme . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201900) . Lecture Notes in Computer Science , vol. 1880 . Springer Verlag, 255--270. Ateniese, G., Camenisch, J., Joye, M., and Tsudik, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201900). Lecture Notes in Computer Science, vol. 1880. Springer Verlag, 255--270."},{"key":"e_1_2_1_4_1","series-title":"Lecture Notes in Computer Science","volume-title":"Secure Internet Programming---Security Issues for Distributed and Mobile Objects","author":"Aura T.","unstructured":"Aura , T. 1999. Distributed access-rights management with delegation certificates . In Secure Internet Programming---Security Issues for Distributed and Mobile Objects . Lecture Notes in Computer Science , vol. 1603 . Springer , 211--235. Aura, T. 1999. Distributed access-rights management with delegation certificates. In Secure Internet Programming---Security Issues for Distributed and Mobile Objects. Lecture Notes in Computer Science, vol. 1603. Springer, 211--235."},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201903)","author":"Balfanz D.","key":"e_1_2_1_5_1","unstructured":"Balfanz , D. , Durfee , G. , Shankar , N. , Smetters , D. , Staddon , J. , and Wong , H . 2003. Secret handshakes from pairing-based key agreements . In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201903) . IEEE Press. 180--196. Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., and Wong, H. 2003. Secret handshakes from pairing-based key agreements. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201903). IEEE Press. 180--196."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201902)","volume":"2442","author":"Barreto P. S.","unstructured":"Barreto , P. S. , Kim , H. Y. , Lynn , B. , and Scott , M . 2002. Efficient algorithms for pairing- based cryptosystems . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201902) . Lecture Notes in Computer Science , vol. 2442 . Springer-Verlag, 354--368. Barreto, P. S., Kim, H. Y., Lynn, B., and Scott, M. 2002. Efficient algorithms for pairing- based cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201902). Lecture Notes in Computer Science, vol. 2442. Springer-Verlag, 354--368."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_38"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"volume-title":"Proceedings of the Security Protocols International Workshop.","author":"Blaze M.","key":"e_1_2_1_9_1","unstructured":"Blaze , M. , Feigenbaum , J. , and Keromytis , A. D . 1998. KeyNote: Trust management for public-key infrastructures . In Proceedings of the Security Protocols International Workshop. Blaze, M., Feigenbaum, J., and Keromytis, A. D. 1998. KeyNote: Trust management for public-key infrastructures. In Proceedings of the Security Protocols International Workshop."},{"volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904)","author":"Boneh D.","key":"e_1_2_1_10_1","unstructured":"Boneh , D. , Boyen , X. , and Shacham , H . 2004. Short group signatures . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904) . Lecture Notes in Computer Science. Boneh, D., Boyen, X., and Shacham, H. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904). Lecture Notes in Computer Science."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901)","volume":"2139","author":"Boneh D.","unstructured":"Boneh , D. and Franklin , M . 2001a. Identity-based encryption from the Weil pairing . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901) . Lecture Notes in Computer Science , vol. 2139 . Springer, 213--229. Boneh, D. and Franklin, M. 2001a. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901). Lecture Notes in Computer Science, vol. 2139. Springer, 213--229."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901)","volume":"2139","author":"Boneh D.","unstructured":"Boneh , D. and Franklin , M. K . 2001b. Identity-based encryption from the Weil pairing . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901) . Lecture Notes in Computer Science , vol. 2139 . Springer, 213--229. Boneh, D. and Franklin, M. K. 2001b. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201901). Lecture Notes in Computer Science, vol. 2139. Springer, 213--229."},{"volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903)","author":"Boneh D.","key":"e_1_2_1_13_1","unstructured":"Boneh , D. , Gentry , C. , Lynn , B. , and Shacham , H . 2003. Aggregate and verifiably encrypted signatures from bilinear maps . In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903) . 416--432. Boneh, D., Gentry, C., Lynn, B., and Shacham, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903). 416--432."},{"volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201905)","author":"Boneh D.","key":"e_1_2_1_14_1","unstructured":"Boneh , D. , Gentry , C. , and Waters , B . 2005. Collusion resistant broadcast encryption with short ciphertexts and private keys . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201905) . Boneh, D., Gentry, C., and Waters, B. 2005. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201905)."},{"key":"e_1_2_1_15_1","volume-title":"Lecture Notes in Computer Science","volume":"2248","author":"Boneh D.","unstructured":"Boneh , D. , Lynn , B. , and Shacham , H . 2001. Short signatures from the Weil pairing. In Advances in Cryptology (ASIACRYPT\u201901) . Lecture Notes in Computer Science , vol. 2248 . Springer-Verlag, 514--523. Boneh, D., Lynn, B., and Shacham, H. 2001. Short signatures from the Weil pairing. In Advances in Cryptology (ASIACRYPT\u201901). Lecture Notes in Computer Science, vol. 2248. Springer-Verlag, 514--523."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201901)","volume":"2045","author":"Camenisch J.","unstructured":"Camenisch , J. and Lysyanskaya , A . 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation . In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201901) , B. Pfitzmann, ed. Lecture Notes in Computer Science , vol. 2045 . Springer Verlag, 93--118. Camenisch, J. and Lysyanskaya, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201901), B. Pfitzmann, ed. Lecture Notes in Computer Science, vol. 2045. Springer Verlag, 93--118."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704437"},{"volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904)","author":"Camenisch J.","key":"e_1_2_1_19_1","unstructured":"Camenisch , J. and Lysyanskaya , A . 2004. Signature schemes and anonymous credentials from bilinear maps . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904) . Camenisch, J. and Lysyanskaya, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201904)."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201997)","volume":"1296","author":"Camenisch J.","unstructured":"Camenisch , J. and Stadler , M . 1997. Efficient group signature schemes for large groups . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201997) . Lecture Notes in Computer Science , vol. 1296 . Springer-Verlag, 410--424. Camenisch, J. and Stadler, M. 1997. Efficient group signature schemes for large groups. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201997). Lecture Notes in Computer Science, vol. 1296. Springer-Verlag, 410--424."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201906)","volume":"4117","author":"Chase M.","unstructured":"Chase , M. and Lysyanskaya , A . 2006. On signatures of knowledge . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201906) . Lecture Notes in Computer Science , vol. 4117 . Springer, 78--96. Chase, M. and Lysyanskaya, A. 2006. On signatures of knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201906). Lecture Notes in Computer Science, vol. 4117. Springer, 78--96."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201986)","author":"Chaum D.","key":"e_1_2_1_24_1","unstructured":"Chaum , D. and Evertse , J . -H. 1987. A secure and privacy-protecting protocol for transmitting personal information between organizations . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201986) . 118--167. Chaum, D. and Evertse, J.-H. 1987. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201986). 118--167."},{"volume-title":"Advances in Cryptology (EUROCRYPT\u201991)","author":"Chaum D.","key":"e_1_2_1_25_1","unstructured":"Chaum , D. and van Heijst , E. 1991. Group signatures . In Advances in Cryptology (EUROCRYPT\u201991) . Springer-Verlag , 257--265. Chaum, D. and van Heijst, E. 1991. Group signatures. In Advances in Cryptology (EUROCRYPT\u201991). Springer-Verlag, 257--265."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Workshop on Information Security Applications (WISA\u201903)","volume":"2908","author":"Chen X.","unstructured":"Chen , X. , Zhang , F. , and Kim , K . 2003. A new ID-based group signature scheme from bilinear pairings . In Proceedings of the International Workshop on Information Security Applications (WISA\u201903) . K. Chae and M. Yung eds. Lecture Notes in Computer Science , vol. 2908 . Springer, 585--592. Chen, X., Zhang, F., and Kim, K. 2003. A new ID-based group signature scheme from bilinear pairings. In Proceedings of the International Workshop on Information Security Applications (WISA\u201903). K. Chae and M. Yung eds. Lecture Notes in Computer Science, vol. 2908. Springer, 585--592."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/512756.512758"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647995.742435"},{"volume-title":"Proceedings of the 15th National Computer Security Conference (NCSC\u201992)","author":"Ferraiolo D.","key":"e_1_2_1_29_1","unstructured":"Ferraiolo , D. and Kuhn , R . 1992. Role-based access control . In Proceedings of the 15th National Computer Security Conference (NCSC\u201992) . Ferraiolo, D. and Kuhn, R. 1992. Role-based access control. In Proceedings of the 15th National Computer Security Conference (NCSC\u201992)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029186"},{"volume-title":"Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS\u201906)","author":"Frikken K. B.","key":"e_1_2_1_31_1","unstructured":"Frikken , K. B. , Li , J. , and Atallah , M. J . 2006. Trust negotiation with hidden credentials, hidden policies, and policy cycles . In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS\u201906) . Frikken, K. B., Li, J., and Atallah, M. J. 2006. Trust negotiation with hidden credentials, hidden policies, and policy cycles. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS\u201906)."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the Trust Management Conference (TRUST\u201903)","volume":"2692","author":"Goodrich M. T.","unstructured":"Goodrich , M. T. , Shin , M. , Tamassia , R. , and Winsborough , W. H . 2003. Authenticated dictionaries for fresh attribute credentials . In Proceedings of the Trust Management Conference (TRUST\u201903) . Lecture Notes in Computer Science , vol. 2692 . Springer, 332--347. Goodrich, M. T., Shin, M., Tamassia, R., and Winsborough, W. H. 2003. Authenticated dictionaries for fresh attribute credentials. In Proceedings of the Trust Management Conference (TRUST\u201903). Lecture Notes in Computer Science, vol. 2692. Springer, 332--347."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/647503.728472"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605438"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201902)","author":"Li N.","key":"e_1_2_1_36_1","unstructured":"Li , N. , Mitchell , J. C. , and Winsborough , W. H . 2002. Design of a role-based trust-management framework . In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201902) . 114--130. Li, N., Mitchell, J. C., and Winsborough, W. H. 2002. Design of a role-based trust-management framework. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201902). 114--130."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/773065.773067"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of Advances in Cryptology (EUROCRYPT\u201904)","volume":"3027","author":"Lysyanskaya A.","unstructured":"Lysyanskaya , A. , Micali , S. , Reyzin , L. , and Shacham , H . 2004. Sequential aggregate signatures from trapdoor permutations . In Proceedings of Advances in Cryptology (EUROCRYPT\u201904) . Lecture Notes in Computer Science , vol. 3027 . Springer-Verlag, 74--90. Lysyanskaya, A., Micali, S., Reyzin, L., and Shacham, H. 2004. Sequential aggregate signatures from trapdoor permutations. In Proceedings of Advances in Cryptology (EUROCRYPT\u201904). Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 74--90."},{"volume-title":"Proceedings of the 7th USENIX Security Symposium (SECURITY\u201998)","author":"Naor M.","key":"e_1_2_1_39_1","unstructured":"Naor , M. and Nissim , K . 1998. Certificate revocation and certificate update . In Proceedings of the 7th USENIX Security Symposium (SECURITY\u201998) . 217--228. Naor, M. and Nissim, K. 1998. Certificate revocation and certificate update. In Proceedings of the 7th USENIX Security Symposium (SECURITY\u201998). 217--228."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC\u201901)","volume":"1992","author":"Okamoto T.","unstructured":"Okamoto , T. and Pointcheval , D . 2001. The gap-problems: A new class of problems for the security of cryptographic schemes . In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC\u201901) . Lecture Notes in Computer Science , vol. 1992 . Springer-Verlag, 104--118. Okamoto, T. and Pointcheval, D. 2001. The gap-problems: A new class of problems for the security of cryptographic schemes. In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC\u201901). Lecture Notes in Computer Science, vol. 1992. Springer-Verlag, 104--118."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.41"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201984)","volume":"196","author":"Shamir A.","year":"1984","unstructured":"Shamir , A. 1984 . Identity-based cryptosystems and signature schemes . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201984) . Lecture Notes in Computer Science , vol. 196 . Springer, 47--53. Shamir, A. 1984. Identity-based cryptosystems and signature schemes. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201984). Lecture Notes in Computer Science, vol. 196. Springer, 47--53."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990061"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201904)","author":"Winsborough W.","key":"e_1_2_1_46_1","unstructured":"Winsborough , W. and Li , N . 2004. Safety in automated trust negotiation . In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201904) . IEEE Press, 147--160. Winsborough, W. and Li, N. 2004. Safety in automated trust negotiation. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201904). IEEE Press, 147--160."},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the International Conference on Securiy and Management (SAM\u201908)","author":"Yao D.","year":"2008","unstructured":"Yao , D. 2008 . An ad hoc trust inference model for flexible and controlled information sharing . In Proceedings of the International Conference on Securiy and Management (SAM\u201908) . 555--561. Yao, D. 2008. An ad hoc trust inference model for flexible and controlled information sharing. In Proceedings of the International Conference on Securiy and Management (SAM\u201908). 555--561."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030130"},{"volume-title":"Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance Workshop (IAW\u201906)","author":"Yao D.","key":"e_1_2_1_49_1","unstructured":"Yao , D. and Tamassia , R . 2006. Cascaded authorization with anonymous-signer aggregate signatures . In Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance Workshop (IAW\u201906) . 84--91. Yao, D. and Tamassia, R. 2006. Cascaded authorization with anonymous-signer aggregate signatures. In Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance Workshop (IAW\u201906). 84--91."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.28"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352633"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455526.1455528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1455526.1455528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:18Z","timestamp":1750287258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455526.1455528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1145\/1455526.1455528"],"URL":"https:\/\/doi.org\/10.1145\/1455526.1455528","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2009,1]]},"assertion":[{"value":"2006-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}