{"id":"https://openalex.org/W2241018210","doi":"https://doi.org/10.1007/978-3-642-38530-8_2","title":"Malleable Signatures for Resource Constrained Platforms","display_name":"Malleable Signatures for Resource Constrained Platforms","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2241018210","doi":"https://doi.org/10.1007/978-3-642-38530-8_2","mag":"2241018210"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-38530-8_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-38530-8_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01485931","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063734323","display_name":"Henrich C. P\u00f6hls","orcid":"https://orcid.org/0000-0002-7256-0387"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Henrich C. P\u00f6hls","raw_affiliation_strings":["Chair of IT-Security, University of Passau, Germany","Institute of IT-Security and Security Law (ISL), University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of IT-Security, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]},{"raw_affiliation_string":"Institute of IT-Security and Security Law (ISL), University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101888253","display_name":"Stefan Peters","orcid":"https://orcid.org/0000-0002-3604-4625"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Peters","raw_affiliation_strings":["Institute of IT-Security and Security Law (ISL), University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of IT-Security and Security Law (ISL), University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005941408","display_name":"Kai Samelin","orcid":null},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kai Samelin","raw_affiliation_strings":["Chair of Computer Networks and Computer Communication, University of Passau, Germany","Institute of IT-Security and Security Law (ISL), University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Computer Networks and Computer Communication, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]},{"raw_affiliation_string":"Institute of IT-Security and Security Law (ISL), University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088633946","display_name":"Joachim Posegga","orcid":"https://orcid.org/0000-0002-6468-809X"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Joachim Posegga","raw_affiliation_strings":["Chair of IT-Security, University of Passau, Germany","Institute of IT-Security and Security Law (ISL), University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of IT-Security, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]},{"raw_affiliation_string":"Institute of IT-Security and Security Law (ISL), University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085867563","display_name":"Hermann de Meer","orcid":"https://orcid.org/0000-0002-3466-8135"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hermann de Meer","raw_affiliation_strings":["Chair of Computer Networks and Computer Communication, University of Passau, Germany","Institute of IT-Security and Security Law (ISL), University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Computer Networks and Computer Communication, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]},{"raw_affiliation_string":"Institute of IT-Security and Security Law (ISL), University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063734323"],"corresponding_institution_ids":["https://openalex.org/I186354981"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":2.3763,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.89932474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7082496285438538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6571105122566223},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.6542119979858398},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5974730253219604},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.5558534264564514},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.48511803150177},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4811364710330963},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4612082540988922},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12443670630455017},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09229567646980286}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7082496285438538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6571105122566223},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.6542119979858398},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5974730253219604},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.5558534264564514},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.48511803150177},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4811364710330963},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4612082540988922},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12443670630455017},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09229567646980286},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-38530-8_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-38530-8_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01485931v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01485931","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, &#x27E8;10.1007/978-3-642-38530-8_2&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01485931v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01485931","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, &#x27E8;10.1007/978-3-642-38530-8_2&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W35292054","https://openalex.org/W40180733","https://openalex.org/W154766510","https://openalex.org/W186599122","https://openalex.org/W191868986","https://openalex.org/W1476724193","https://openalex.org/W1499578390","https://openalex.org/W1505638253","https://openalex.org/W1506251333","https://openalex.org/W1549397354","https://openalex.org/W1555353059","https://openalex.org/W1557120284","https://openalex.org/W1562394980","https://openalex.org/W1589205472","https://openalex.org/W1594668186","https://openalex.org/W1600885681","https://openalex.org/W1612432860","https://openalex.org/W1718283113","https://openalex.org/W1784881995","https://openalex.org/W1847262859","https://openalex.org/W1940933138","https://openalex.org/W2096472369","https://openalex.org/W2115073115","https://openalex.org/W2133825295","https://openalex.org/W2167179301","https://openalex.org/W2237054519","https://openalex.org/W2478028046","https://openalex.org/W2482045774","https://openalex.org/W2482495164","https://openalex.org/W2490520464","https://openalex.org/W2494402301","https://openalex.org/W2498234599","https://openalex.org/W2498906313","https://openalex.org/W2503095780","https://openalex.org/W2572799557","https://openalex.org/W2915032814","https://openalex.org/W2916443479","https://openalex.org/W2971126390"],"related_works":["https://openalex.org/W2982321410","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W2353110924","https://openalex.org/W2898483019","https://openalex.org/W4252821595","https://openalex.org/W1932157736","https://openalex.org/W1981680180","https://openalex.org/W2033963098","https://openalex.org/W2125461068"],"abstract_inverted_index":{"Malleable":[0],"signatures":[1],"allow":[2],"the":[3,32,38,97,101,105,123,133],"signer":[4,13],"to":[5,8,16,20,113],"control":[6],"alterations":[7,15,28],"a":[9,44,77,110,115,128],"signed":[10],"document.":[11],"The":[12,119],"limits":[14],"certain":[17,21],"parties":[18],"and":[19,34,53,61,79,84,104,107],"parts":[22],"defined":[23],"during":[24],"signature":[25,33,65],"generation.":[26],"Admissible":[27],"do":[29,35],"not":[30,36],"invalidate":[31],"involve":[37],"signer.":[39],"These":[40],"properties":[41],"make":[42],"them":[43],"versatile":[45],"tool":[46],"for":[47,76],"several":[48],"application":[49],"domains,":[50],"like":[51],"e-business":[52],"health":[54],"care.":[55],"We":[56],"implemented":[57],"one":[58],"secure":[59,63,78],"redactable":[60,117],"three":[62],"sanitizable":[64],"schemes":[66,125],"on":[67],"secure,":[68],"but":[69],"computationally":[70],"bounded,":[71],"smart":[72],"card.":[73,138],"This":[74],"allows":[75],"practically":[80],"usable":[81],"key":[82],"management":[83],"meets":[85],"legal":[86],"standards":[87],"of":[88,122,135],"EU":[89],"legislation.":[90],"To":[91],"gain":[92],"speed":[93],"we":[94,108],"securely":[95],"divided":[96],"computing":[98],"tasks":[99],"between":[100],"powerful":[102],"host":[103],"card;":[106],"devise":[109],"new":[111],"accumulator":[112],"yield":[114],"useable":[116],"scheme.":[118],"performance":[120,130],"analysis":[121],"four":[124],"shows":[126],"only":[127],"small":[129],"hit":[131],"by":[132],"use":[134],"an":[136],"off-the-shelf":[137]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
