{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:41:29Z","timestamp":1729629689775,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.211","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1704-1707","source":"Crossref","is-referenced-by-count":1,"title":["Server-Aided Verification Proxy Re-signature"],"prefix":"10.1109","author":[{"given":"Zhiwei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lv","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ACM CCS","article-title":"Proxy re-signatures: New definitions, algorithms, and applications","year":"2005","author":"ateniese","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455835"},{"journal-title":"Eurocrypt","article-title":"Divertible protocols and atomic proxy cryptography","year":"1998","author":"blaze","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.01.036"},{"key":"7","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/3-540-44750-4_6","article-title":"Security and performance of serveraided rsa computation protocols","volume":"963","author":"lim","year":"1995","journal-title":"Advances in Cryptology - Crypto'97 Lecture Notes in Computer Science"},{"key":"6","article-title":"Speeding up smart card rsa computation with insecure coprocessors","volume":"1989","author":"quisquater","year":"2000","journal-title":"Proceedings of Smart Cards"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2011.00801"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_14"},{"key":"9","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/11593447_33","article-title":"Server-aided verification: Theory and practice","volume":"3788","author":"girault","year":"2005","journal-title":"Lecture Notes on Computer Science"},{"journal-title":"Eurocrypt02?Rump Session","article-title":"Gq+gps = new ideas + new protocols","year":"2002","author":"girault","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681038.pdf?arnumber=6681038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:26Z","timestamp":1498091186000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.211","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}