{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:23Z","timestamp":1750220903855,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":16,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369658","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"261-266","source":"Crossref","is-referenced-by-count":1,"title":["One-Verifier Signature Scheme and Its Applications"],"prefix":"10.1145","author":[{"given":"Van Anh","family":"Trinh","sequence":"first","affiliation":[{"name":"Thanh Hoa University of Culture, Sports and Tourism, Thanh Hoa, Vietnam"}]},{"given":"Viet Cuong","family":"Trinh","sequence":"additional","affiliation":[{"name":"Hong Duc University, Thanh Hoa, Vietnam"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369658-1","doi-asserted-by":"crossref","unstructured":"D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology, 21(2):149--177, doi:10.1007\/s00145-007-9005-7, 2008.","DOI":"10.1007\/s00145-007-9005-7"},{"key":"key-10.1145\/3368926.3369658-2","unstructured":"S. Canard, D. H. Phan, and V. C. Trinh. An attribute-based broadcast encryption scheme for lightweight devices. IET Information Security: Volume 12, Issue 1, January 2018, p. 52--59 DOI: 10.1049\/iet-ifs.2017.0157, Print ISSN 1751-8709, Online ISSN 1751-8717, 2017."},{"key":"key-10.1145\/3368926.3369658-3","unstructured":"S. Canard, D. H. P. D. Pointcheval, and V. C. Trinh. A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. Theoretical Computer Science, Volume 723, 2018, Pages 51--72, ISSN 0304-3975, https:\/\/doi.org\/10.1016\/j.tcs.2018.02.036. (http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397518301427), 2018."},{"key":"key-10.1145\/3368926.3369658-4","unstructured":"S. Canard and V. C. Trinh. An Efficient Certificateless Signature Scheme in the Standard Model. In: Ray I., Gaur M., Conti M., Sanghi D., Kamakoti V. (eds) International Conference on Information Systems Security, ICISS 2016. Lecture Notes in Computer Science, Springer International Publishing. Vol 10063, pages=\"175--192\", ISBN: 978-3-319-49806-5, https:\/\/doi.org\/10.1007\/978-3-319-49806-5-9, 2016."},{"key":"key-10.1145\/3368926.3369658-5","unstructured":"S. Canard and V. C. Trinh. Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. In: Ray I., Gaur M., Conti M., Sanghi D., Kamakoti V. (eds) International Conference on Information Systems Security, ICISS 2016. Lecture Notes in Computer Science, Springer International Publishing. Vol 10063, pages=\"193--211\", ISBN: 978-3-319-49806-5, https:\/\/doi.org\/10.1007\/978-3-319-49806-5-9, 2016."},{"key":"key-10.1145\/3368926.3369658-6","doi-asserted-by":"crossref","unstructured":"Q.Huang, G.Yang, D.S.Wong, and W.Susilo. Identity-based strong designated verifier signature revisited. Journal of Systems and Sotware, vol.84, no.1, pp.120--129. 2011","DOI":"10.1016\/j.jss.2010.08.057"},{"key":"key-10.1145\/3368926.3369658-7","unstructured":"M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. Advances in Cryptology EUROCRYPT'96, vol.1070 of Lecture Notes in Computer Science pp. 143--154, Springer, Berlin, Heidelberg, 1996."},{"key":"key-10.1145\/3368926.3369658-8","unstructured":"H.Y. Lin, T.S.Wu, and S.K.Huang. An eicient strong designated verifier proxy signature scheme for electronic commerce. JISE. Journal of Information Science and Engineering vol.28, no 4, pp. 771--785, 2012."},{"key":"key-10.1145\/3368926.3369658-9","unstructured":"Han-Yu Lin, Chia-Hung Wu and Yan-Ru Jiang. On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme. New Trends in Computer Technologies and Applications. ICS 2018. Communications in Computer and Information Science vol 1013, Online ISBN 978-981-13-9190-3. Springer, Singapore, 2019."},{"key":"key-10.1145\/3368926.3369658-10","unstructured":"Y. Ming, Q.Jin, and X. Zhao. Designated verifier proxy signature scheme with multi-warrant in the standard model. Journal of Information and Computational Science vol.10, no.7 pp. 2097--2107, 2013."},{"key":"key-10.1145\/3368926.3369658-11","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and O. Sanders. Short randomizable signatures. In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings, volume 9610 of Lecture Notes in Computer Science, pages 111--126. Springer, 2016.","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"key-10.1145\/3368926.3369658-12","unstructured":"D. Pointcheval and O. Sanders. Reassessing Security of Randomizable Signatures. In Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16 - 20, 2018, Proceedings, volume 10808 of Lecture Notes in Computer Science. Springer, 2018."},{"key":"key-10.1145\/3368926.3369658-13","doi-asserted-by":"crossref","unstructured":"Huang, Qiong and Yang, Guomin and Wong, Duncan S and Susilo, Willy. Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. International Journal of Information Security issn=\"1615-5270\", doi=\"10.1007\/s10207-011-0146-1\", url=\"https:\/\/doi.org\/10.1007\/s10207-011-0146-1\". 2011","DOI":"10.1007\/s10207-011-0146-1"},{"key":"key-10.1145\/3368926.3369658-14","doi-asserted-by":"crossref","unstructured":"B. Yang, Y. Sun, Y. Yu, and Q. Xia. A strong designated verifier signature scheme with secure disavowability. Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS'12) pp. 286--291, IEEE, Bucharest, Romania, September 2012.","DOI":"10.1109\/iNCoS.2012.24"},{"key":"key-10.1145\/3368926.3369658-15","doi-asserted-by":"crossref","unstructured":"B. Yang, Y. Yu, and Y. Sun. A novel construction of SDVS with secure disavowability. Cluster Computing vol. 16, no.4, pp 807--815, 2013.","DOI":"10.1007\/s10586-013-0254-y"},{"key":"key-10.1145\/3368926.3369658-16","doi-asserted-by":"crossref","unstructured":"Xiaoming Hu, Wenan Tan, Huajie Xu, Jian Wang, and Chuang Ma. Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Security and Communication Networks Volume 2017, Article ID 7921782, 9 pages, https:\/\/doi.org\/10.1155\/2017\/7921782. 2017","DOI":"10.1155\/2017\/7921782"}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369658&ftid=2101280&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:50Z","timestamp":1750203890000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369658"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369658","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}