{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:01:18Z","timestamp":1729620078729,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/cis.2009.42","type":"proceedings-article","created":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T19:18:33Z","timestamp":1264015113000},"page":"473-477","source":"Crossref","is-referenced-by-count":0,"title":["A New Digital Proxy Signature Scheme Based on ECDLP"],"prefix":"10.1109","author":[{"given":"Chengming","family":"Qi","sequence":"first","affiliation":[]},{"given":"Xusheng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9082-x"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1016\/j.future.2003.09.005","article-title":"A threshold signature scheme for group communications without a shared distribution center","volume":"20","author":"ting-yi","year":"2004","journal-title":"Future Generation Computer Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2004.1297083"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.322"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref16"},{"key":"ref17","first-page":"109","article-title":"On the Elliptic Curve Digital Signature Algorithm","volume":"8","author":"liao","year":"2006","journal-title":"Tunghai Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref6","first-page":"1338","article-title":"Proxy signatures: delegation of the power to sign message","volume":"e79 a","author":"mambo","year":"1996","journal-title":"IEICE Transactions on Fundamentals"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Uses of elliptic curves in Cryptography","volume":"218","author":"miller","year":"1985","journal-title":"Advances in Cryptology-CRYPTO' 89 Proceedings Lecture Notes in Computer Science"},{"key":"ref8","first-page":"474","article-title":"Secure mobile agent using strong non-designated proxy signature","volume":"2119","author":"lee","year":"2001","journal-title":"Information Security and Privacy (ACISP'01) LNCS"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/238168.238185","article-title":"Proxy signatures for delegating signing operation","author":"mambo","year":"1996","journal-title":"Proc of 3rd ACM Conference on Computer and Communications Security (CCS'96)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"222","DOI":"10.3844\/jmssp.2008.222.225","article-title":"A New Digital Signature Scheme Based on Factoring and Discrete Logarithms","volume":"4","author":"ismail","year":"2008","journal-title":"Journal of Mathematics and Statistics"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-36563-X_5","article-title":"An analysis of proxy signatures: Is a secure channel necessary?","volume":"2612","author":"lee","year":"2003","journal-title":"Topics in Cryptology-CT-RSA 2003 LNCS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"}],"event":{"name":"2009 International Conference on Computational Intelligence and Security","start":{"date-parts":[[2009,12,11]]},"location":"Beijing, China","end":{"date-parts":[[2009,12,14]]}},"container-title":["2009 International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5375729\/5375794\/05376466.pdf?arnumber=5376466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T07:58:47Z","timestamp":1558771127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5376466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cis.2009.42","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}