{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T05:58:03Z","timestamp":1718517483521},"reference-count":18,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.12.2983-2990","type":"journal-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T15:58:08Z","timestamp":1387555088000},"source":"Crossref","is-referenced-by-count":1,"title":["Short Convertible Undeniable Signature From Pairing"],"prefix":"10.17706","volume":"8","author":[{"given":"Fei","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yilei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xueli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,12,1]]},"reference":[{"key":"ref1","first-page":"212","article-title":"Undeniable Signatures, Proceedingsof Crypto '89","volume":"435","author":"Chaum","year":"1990","unstructured":"[1] D.Chaum, H. van Antwerpen, Undeniable Signatures, Proceedingsof Crypto '89, Springer LNCS Vol.435, 212-216, 1990.","journal-title":"Springer LNCS"},{"key":"ref2","first-page":"458","article-title":"Zero-Knowledge undeniable signatures. Proceedings ofEurocrypt90","volume":"473","author":"Chaum","year":"1991","unstructured":"[2] D. Chaum, Zero-Knowledge undeniable signatures. Proceedings ofEurocrypt90, Springer LNCS Vol. 473, pp. 458-464, 1991.","journal-title":"Springer LNCS"},{"key":"ref3","first-page":"189","article-title":"Convertible undeniable signatures. Proc. of Crypto90","volume":"537","author":"Boyar","year":"1991","unstructured":"[3] J. Boyar, D. Chaum, I. B. Damgard, T.P. Pedersen: Convertible undeniable signatures. Proc. of Crypto90, Springer LNCS Vol. 537,189-205, 1991","journal-title":"Springer LNCS"},{"key":"ref4","first-page":"418","article-title":"From identificationto signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Proc. of Eurocrypt02","volume":"2332","author":"Abdalla","year":"2002","unstructured":"[4] M. Abdalla, J. An, M. Bellare and C. Namprempre. From identificationto signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Proc. of Eurocrypt02,Springer LNCS Vol.2332, 418-433, 2002.","journal-title":"Springer LNCS"},{"key":"ref5","first-page":"132","article-title":"RSA-based undeniable signatures. Proc. of Crypto97","volume":"1294","author":"Gennaro","year":"1997","unstructured":"[10] R. Gennaro, H. Krawczyk, T. Rabin: RSA-based undeniable signatures. Proc. of Crypto97, Springer LNCS Vol. 1294, 132-149, 1997","journal-title":"Springer LNCS"},{"key":"ref6","first-page":"89","article-title":"Wallet Databases with Observers. Proc. of Crypto92","volume":"740","author":"Chaum","year":"1993","unstructured":"[13] D. Chaum, T.P. Pedersen: Wallet Databases with Observers. Proc. of Crypto92, Springer LNCS Vol. 740, 89-105, 1993","journal-title":"Springer LNCS"},{"key":"ref7","first-page":"271","article-title":"Off-line Fair Payment Protocols using Convertible Signatures. Proc. of Asiacrypt98","volume":"1514","author":"Boyd","year":"1998","unstructured":"[14] C. Boyd, E. Foo: Off-line Fair Payment Protocols using Convertible Signatures. Proc. of Asiacrypt98, Springer LNCS Vol. 1514, 271-285, 1998","journal-title":"Springer LNCS"},{"key":"ref8","first-page":"428","article-title":"New Approach for Selectively Convertible Undeniable Signature Schemes.","volume-title":"Proc of ASIACRYPT","author":"Kurosawa","year":"2006","unstructured":"[15] K. Kurosawa, T. Takagi. New Approach for Selectively Convertible Undeniable Signature Schemes. Proc. of ASIACRYPT 2006, Springer LNCS 4284, pp.428-443"},{"key":"ref9","first-page":"83","article-title":"Willy Susilo. (Convertible) Undeniable Signatures Without Random Oracles.","volume-title":"Proc of ICICS","author":"Yuen","year":"2007","unstructured":"[16] T.H. Yuen, M.H. Au, J. K. Liu, Willy Susilo. (Convertible) Undeniable Signatures Without Random Oracles. Proc. of ICICS 2007, Springer LNCS 4861, pp.83-97."},{"key":"ref10","first-page":"145","article-title":"Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures.","volume-title":"Proc of INDOCRYPT","author":"Aimani","year":"2008","unstructured":"[17] L.E. Aimani. Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. Proc. of INDOCRYPT 2008, Springer LNCS 5365 pp.145-157"},{"key":"ref11","first-page":"291","article-title":"Provably Secure Convertible Undeniable Signatures with Unambiguity.","volume-title":"Proc of SCN","author":"Phong","year":"2010","unstructured":"[19] L.T. Phong, K. Kurosawa, W. Ogata. Provably Secure Convertible Undeniable Signatures with Unambiguity. Proc. of SCN 2010, Springer LNCS 6280, pp.291-308"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.046"},{"key":"ref13","first-page":"514","article-title":"Short signatures from the Weil pairing. Proc. of Asiacrypt01","volume":"2248","author":"Boneh","year":"2001","unstructured":"[23] D. Boneh, B. Lynn, H. Shacham: Short signatures from the Weil pairing. Proc. of Asiacrypt01, Springer LNCS Vol. 2248, 514-532, 2001","journal-title":"Springer LNCS"},{"key":"ref14","first-page":"397","article-title":"Transitive Signatures based on Factoring and RSA. Proc. of Asiacrypt'02","volume":"2501","author":"Bellare","year":"2002","unstructured":"[29] M. Bellare and G. Neven. Transitive Signatures based on Factoring and RSA. Proc. of Asiacrypt'02, Springer LNCS Vol. 2501, 397-414, 2002.","journal-title":"Springer LNCS"},{"key":"ref15","first-page":"268","article-title":"Security Proofs for Identity-Based Identification and Signature Schemes. Proc. of Eurocrypt' 2004","volume":"3027","author":"Bellare","year":"2004","unstructured":"[30] M. Bellare, C. Namprempre, G. Neven, Security Proofs for Identity-Based Identification and Signature Schemes. Proc. of Eurocrypt' 2004, Springer LNCS Vol.3027, 268\u2013286, 2004.","journal-title":"Springer LNCS"},{"key":"ref16","first-page":"126","article-title":"Practical Verifiable Encryption and Decryption of Discrete Logarithms. Proc. of Crypto03","volume":"2729","author":"Camenisch","year":"2003","unstructured":"[31] J. Camenisch, V. Shoup: Practical Verifiable Encryption and Decryption of Discrete Logarithms. Proc. of Crypto03, Springer LNCS Vol. 2729, 126-144, 2003","journal-title":"Springer LNCS"},{"key":"ref17","first-page":"143","article-title":"Designated verifier proofs and their applications. Proc. of Eurocrypt'96","volume":"1070","author":"Jakobsson","year":"1996","unstructured":"[32] M. Jakobsson, K. Sako and R. Impagliazzo. Designated verifier proofs and their applications. Proc. of Eurocrypt'96, Springer LNCS Vol.1070, 143-154, 1996.","journal-title":"Springer LNCS"},{"key":"ref18","first-page":"174","article-title":"Proofs of partial knowledge and simplified design of witness hiding protocols. Proc. of Crypto'94","volume":"839","author":"Cramer","year":"1994","unstructured":"[34] R. Cramer, I. Damgoard and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. Proc. of Crypto'94, Springer LNCS Vol.839, 174-187, 1994","journal-title":"Springer LNCS"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:24:23Z","timestamp":1442330663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":18,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2013,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.12.2983-2990","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}