{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T22:21:30Z","timestamp":1744755690190},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_29","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"352-367","source":"Crossref","is-referenced-by-count":8,"title":["On the Security of the RSA-Based Multisignature Scheme for Various Group Structures"],"prefix":"10.1007","author":[{"given":"Hiroshi","family":"Doi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masahiro","family":"Mambo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-46588-1_31","volume-title":"Public Key Cryptography","author":"M. Burmester","year":"2000","unstructured":"Burmester, M., Desmedt, Y., Doi, H., Mambo, M., Okamoto, E., Tada, M., Yoshifuji, Y.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 466\u2013482. Springer, Heidelberg (2000)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/3-540-45961-8_40","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"C. Boyd","year":"1988","unstructured":"Boyd, C.: Some Applications of Multiple Key Ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 455\u2013467. Springer, Heidelberg (1988)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/3-540-46766-1_37","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"Y. Desmedt","year":"1992","unstructured":"Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 457\u2013469. Springer, Heidelberg (1992)"},{"key":"29_CR4","unstructured":"Doi, H., Okamoto, E., Mambo, M., Uyematsu, T.: Multisignature Scheme with Specified Order, SCIS94-2A, January 27-29 (1994)"},{"key":"29_CR5","unstructured":"Doi, H., Okamoto, E., Mambo, M.: Multisignature Schemes for Various Group Structures. In: Proc. of 36th Annual Allerton Conference on Communication, Control and Computing, pp. 713\u2013722 (1999)"},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Inform. Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"29_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7","volume-title":"A Course in Number Theory and Cryptography, GTM 114","author":"N. Koblitz","year":"1994","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography, GTM 114, 2nd edn. Springer, Heidelberg (1994)","edition":"2"},{"issue":"8","key":"29_CR8","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"Okamoto, T.: A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystems. ACM Trans. on Computer Systems\u00a06(8), 432\u2013441 (1988)","journal-title":"ACM Trans. on Computer Systems"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. of the ACM"},{"issue":"12","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1049\/el:19930747","volume":"29","author":"S. Yen","year":"1993","unstructured":"Yen, S., Laih, C.: New Digital Signature Scheme Based on Discrete Logarithm. Electronics Letters\u00a029(12), 1120\u20131121 (1993)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:35:21Z","timestamp":1552880121000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/10718964_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}