{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:25:32Z","timestamp":1729628732324,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/incos.2013.95","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T22:01:08Z","timestamp":1387317668000},"page":"503-506","source":"Crossref","is-referenced-by-count":1,"title":["A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing"],"prefix":"10.1109","author":[{"given":"Huai","family":"Wu","sequence":"first","affiliation":[]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"17","first-page":"158","article-title":"Comment on wu et al.'s serveraided verification signature schemes","volume":"10","author":"wang","year":"2010","journal-title":"International Journal of Network Security"},{"key":"18","first-page":"416","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps","author":"boneh","year":"2003","journal-title":"Advances in Cryptography-Euro-crypt 2003 2656 of LNCS"},{"key":"15","first-page":"141","article-title":"Server-aided verification signatures: Definitions and new constructions","volume":"5324","author":"wei","year":"2008","journal-title":"Prov Sec 2008"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.01.036"},{"key":"13","article-title":"On-line\/off-line RSA-like","author":"girault","year":"2003","journal-title":"International Workshop on Coding and Cryptography 2003"},{"key":"14","first-page":"605","article-title":"Server-aided verification: Theory and practice","author":"girault","year":"2005","journal-title":"ASIACRYPT"},{"key":"11","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","article-title":"The be?guin-quisquater server-aided RSA protocol from crypto95 is not secure","volume":"1514","author":"nguyen","year":"1998","journal-title":"ASIACRYPT'98 In Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010001"},{"key":"21","first-page":"465","article-title":"Sequential aggregate signatures and multisignatures without random oracles","author":"lu","year":"2006","journal-title":"Advances in Cryptography Eurocrypt '94"},{"key":"3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-47555-9_13","article-title":"Attacks on protocols for server-aided RSA computation","volume":"658","author":"pfitzmann","year":"1992","journal-title":"Eurocrypt'92 In Lecture Notes in Computer Science"},{"key":"20","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","article-title":"Sequential aggregate signatures from trapdoor permutations","author":"lysyanskaya","year":"2004","journal-title":"Advances in Cryptography-Eurocrypt 2004"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_35"},{"key":"10","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/3-540-44750-4_5","article-title":"Fast server-aided RSA signatures secure against active attacks","volume":"963","author":"beguin","year":"1995","journal-title":"CRYPT0'95 In Lecture Notes in Computer Science"},{"key":"1","first-page":"191","article-title":"Speeding up smart card RSA computation with insecure coprosessors","author":"quisquater","year":"1989","journal-title":"Proceeding of Smart Cards 2000"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/49.223880"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(93)90059-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/el:19920937"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/el:19921446"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/12.262121"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_70"}],"event":{"name":"2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","start":{"date-parts":[[2013,9,9]]},"location":"Xi'an city, Shaanxi province, China","end":{"date-parts":[[2013,9,11]]}},"container-title":["2013 5th International Conference on Intelligent Networking and Collaborative Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6630246\/6630249\/06630464.pdf?arnumber=6630464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:26:02Z","timestamp":1498105562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6630464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/incos.2013.95","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}