{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:21Z","timestamp":1772283681123,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST CREST","award":["JPMJCR19F6"],"award-info":[{"award-number":["JPMJCR19F6"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329824","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"515-528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Proper Usage of the Group Signature Scheme in ISO\/IEC 20008-2"],"prefix":"10.1145","author":[{"given":"Ai","family":"Ishida","sequence":"first","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]},{"given":"Keisuke","family":"Tanaka","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ISO\/IEC 9796--2:2010 information technology -- security techniques -- digital signature schemes giving message recovery -- part 2: Integer factorization based mechanisms.  ISO\/IEC 9796--2:2010 information technology -- security techniques -- digital signature schemes giving message recovery -- part 2: Integer factorization based mechanisms."},{"key":"e_1_3_2_1_2_1","unstructured":"ISO\/IEC 20008--2:2013 information technology -- security techniques -- anonymous digital signatures -- part 2: Mechanisms using a group public key.  ISO\/IEC 20008--2:2013 information technology -- security techniques -- anonymous digital signatures -- part 2: Mechanisms using a group public key."},{"key":"e_1_3_2_1_4_1","volume-title":"Book 2, Security and Key Management, Version 4.2","author":"EMV","year":"2008","unstructured":"EMV , Integrated Circuit Card Specifications for Payment Systems , Book 2, Security and Key Management, Version 4.2 , 2008 . EMV, Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management, Version 4.2, 2008."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel Enhanced Privacy ID (EPID) Security Technology https:software.intel.comen-us\/articles\/intel-enhanced-privacy-id-epid-security-technology.  Intel Enhanced Privacy ID (EPID) Security Technology https:software.intel.comen-us\/articles\/intel-enhanced-privacy-id-epid-security-technology."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Software Guard Extensions (Intel SGX) https:\/\/software.intel.com\/en-us\/sgx.  Intel Software Guard Extensions (Intel SGX) https:\/\/software.intel.com\/en-us\/sgx."},{"key":"e_1_3_2_1_7_1","unstructured":"NISC-PEC December 2011 http:\/\/csrc.nist.gov\/groups\/ST\/PEC2011\/presentations2011\/brickell.pdf.  NISC-PEC December 2011 http:\/\/csrc.nist.gov\/groups\/ST\/PEC2011\/presentations2011\/brickell.pdf."},{"key":"e_1_3_2_1_8_1","first-page":"477","volume-title":"FC","author":"Bahmani R.","year":"2017","unstructured":"Bahmani , R. , Barbosa , M. , Brasser , F. , Portela , B. , Sadeghi , A. , Scerri , G. , and Warinschi , B . Secure multiparty computation from SGX . In FC ( 2017 ), pp. 477 -- 497 . Bahmani, R., Barbosa, M., Brasser, F., Portela, B., Sadeghi, A., Scerri, G., and Warinschi, B. Secure multiparty computation from SGX. In FC (2017), pp. 477--497."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754495.1754541"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706320"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.118"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754897"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703971"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_25"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11958239_13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196507"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_38"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.5.1328"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.065"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179541"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796535"},{"key":"e_1_3_2_1_28_1","volume-title":"NDSS","author":"Sasy S.","year":"2018","unstructured":"Sasy , S. , Gorbunov , S. , and Fletcher , C. W . Zerotrace: Oblivious memory primitives from intel SGX . In NDSS ( 2018 ). Sasy, S., Gorbunov, S., and Fletcher, C. W. Zerotrace: Oblivious memory primitives from intel SGX. In NDSS (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_30_1","volume-title":"NDSS","author":"Seo J.","year":"2017","unstructured":"Seo , J. , Lee , B. , Kim , S. M. , Shih , M. , Shin , I. , Han , D. , and Kim , T . Sgx-shield: Enabling address space layout randomization for SGX programs . In NDSS ( 2017 ). Seo, J., Lee, B., Kim, S. M., Shih, M., Shin, I., Han, D., and Kim, T. Sgx-shield: Enabling address space layout randomization for SGX programs. In NDSS (2017)."},{"key":"e_1_3_2_1_31_1","first-page":"736","volume":"2017","author":"Swami Y.","year":"2017","unstructured":"Swami , Y. SGX remote attestation is not sufficient. IACR Cryptology e Print Archive 2017 ( 2017 ), 736 . Swami, Y. SGX remote attestation is not sufficient. IACR Cryptology ePrint Archive 2017 (2017), 736.","journal-title":"Print Archive"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_10"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":31,"alternative-id":["10.1145\/3321705.3329824","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329824","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}