{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:27:46Z","timestamp":1778297266863,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540677420","type":"print"},{"value":"9783540450306","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_25","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"298-312","source":"Crossref","is-referenced-by-count":17,"title":["A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability"],"prefix":"10.1007","author":[{"given":"Shirow","family":"Mitomi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-46588-1_31","volume-title":"Public Key Cryptography","author":"M. Burmester","year":"2000","unstructured":"Burmester, M., Desmedt, Y., Doi, H., Mambo, M., Okamoto, E., Tada, M., Yoshifuji, Y.: A structured elGamal-type multisignature scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 466\u2013482. Springer, Heidelberg (2000)"},{"key":"25_CR2","unstructured":"Specification for a digital signature standard, National Institute for Standards and Technology, Federal Information Standard Publication XX, draft (1991)"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory\u00a0IT-31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"25_CR4","unstructured":"Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC J.Res.Dev.71(October 1983)"},{"key":"25_CR5","volume-title":"The art of computer programming, Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E.: The art of computer programming, Seminumerical Algorithms, 2nd edn., vol.\u00a02. Addison-Wesley, Reading (1981)","edition":"2"},{"issue":"11","key":"25_CR6","first-page":"2192","volume":"E80-A","author":"A. Miyaji","year":"1997","unstructured":"Miyaji, A.: Another countermeasure to forgeries over message recovery signature. IEICE Trans., Fundamentals\u00a0E80-A(11), 2192\u20132200 (1997)","journal-title":"IEICE Trans., Fundamentals"},{"key":"25_CR7","first-page":"61","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. Designs Codes and Cryptography\u00a07, 61\u201381 (1996)","journal-title":"Designs Codes and Cryptography"},{"issue":"8","key":"25_CR8","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"Okamoto, T.: A digital Multisignature Scheme Using Bijective Public-key Cryptosystems. ACM Trans. on Computer Systems\u00a06(8), 432\u2013441 (1988)","journal-title":"ACM Trans. on Computer Systems"},{"issue":"2","key":"25_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-49264-X_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"K. Sakurai","year":"1995","unstructured":"Sakurai, K., Shizuya, H.: Relationships among the computational powers of breaking Discrete Log cryptosystem. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 341\u2013355. Springer, Heidelberg (1995); J. Cryptology 11, 29-43 (1998)"},{"key":"25_CR11","unstructured":"Shimbo, A.: Multisignature Schemes Based on the Elgamal Scheme. In: The 1994 Symposium on Cryptography and Information Security, SCIS94-2C (January 1994)"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of cryptology\u00a04, 161\u2013174 (1991)","journal-title":"Journal of cryptology"},{"key":"25_CR13","unstructured":"Saito, T.: A Multiple Signature Scheme Enabling a Specified Signer\u2019s Order. In: The 1997 Symposium on Cryptography and Information Security, SCIS97-33A (January 1994)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:23:16Z","timestamp":1552879396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/10718964_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}