{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:56:41Z","timestamp":1743091001789,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309345"},{"type":"electronic","value":"9783540320999"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11602897_18","type":"book-chapter","created":{"date-parts":[[2005,11,17]],"date-time":"2005-11-17T05:31:17Z","timestamp":1132205477000},"page":"207-219","source":"Crossref","is-referenced-by-count":3,"title":["Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains"],"prefix":"10.1007","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-46588-1_31","volume-title":"Public Key Cryptography","author":"M. Burmester","year":"2000","unstructured":"Burmester, M., Desmedt, Y., Doi, H., Mambo, M., Okamoto, E., Tada, M., Yoshifuji, Y.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 466\u2013483. Springer, Heidelberg (2000)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"18_CR4","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: A Survey of Two Signature Aggregation Techniques. CryptoBytes\u00a06(2) (2003)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proceedings of CCS 1993","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.) Proceedings of CCS 1993, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/3-540-48910-X_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"J. Camenisch","year":"1999","unstructured":"Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 107\u2013122. Springer, Heidelberg (1999)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J. Coron","year":"2000","unstructured":"Coron, J.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 229\u2013235. Springer, Heidelberg (2000)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/10718964_29","volume-title":"Information Security and Privacy","author":"H. Doi","year":"2000","unstructured":"Doi, H., Mambo, M., Okamoto, E.: On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 352\u2013367. Springer, Heidelberg (2000)"},{"key":"18_CR9","unstructured":"Doi, H., Okamoto, E., Mambo, M., Uyematsu, T.: Multisignature Scheme with Specified Order. In: Proc. of the 1994 Symposium on Cryptography and Information Security, SCIS94-2A, January 27 -29 (1994)"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput.\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"18_CR11","first-page":"128","volume-title":"Proc. of IFIP Sec. 1995","author":"P. Horster","year":"1995","unstructured":"Horster, P., Michels, M., Petersen Meta-multisignature, H.: schemes based on the discrete logarithm problem, Information Security -the Next Decade. In: Proc. of IFIP Sec. 1995, pp. 128\u2013142. Chapman-Hall, Boca Raton (1995)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/3-540-57220-1_56","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"T. Hardjono","year":"1993","unstructured":"Hardjono, T., Zheng, Y.: A practical digital multisignature scheme based on discrete logarithms. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 122\u2013132. Springer, Heidelberg (1993)"},{"key":"18_CR13","unstructured":"Itakura, K., Nakamura, K.: A public key cryptographic suitable for digital multisignatures. NEC Rearch and Development (71), 1\u20138 (1983)"},{"key":"#cr-split#-18_CR14.1","unstructured":"Kawauchi, K., Komano, Y., Ohta, K., Tada, M.: Probabilistic multi-signature schemes using a one-way trapdoor permutation. IEICE transactions on fundamentals E87-A(5), 1141-1153 (2004)"},{"key":"#cr-split#-18_CR14.2","doi-asserted-by":"crossref","unstructured":"Previous version: Kawauchi, K., Tada, M.: On the Extract Security of Multi-signature Schemes Based on RSA. ACISP 2003, pp. 336-349 (2003)","DOI":"10.1007\/3-540-45067-X_29"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communicaitons 18(4) (April 2000)","DOI":"10.1109\/49.839934"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from trapdoor one-way permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 74\u201390. Springer, Heidelberg (2004)"},{"key":"#cr-split#-18_CR17.1","unstructured":"Mitomi, S., Miyaji, A.: A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability. IEICE Trans., Fundamentals\u00a0E84-A(10), 2488-2499 (2001)"},{"key":"#cr-split#-18_CR17.2","doi-asserted-by":"crossref","unstructured":"Previous version: Mitomi, S., Miyaji, A.: A multisignature scheme with message flexibility, order flexibility and order verifiability, Information security and privacy-Proceedings of ACISP 2000. LNCS, vol. 1841, pp. 298-312. Springer, Heidelberg (2000)","DOI":"10.1007\/10718964_25"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1145\/501983.502017","volume-title":"Proceedings of CCS 2001","author":"S. Micali","year":"2001","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures (extended abstract). In: Proceedings of CCS 2001, pp. 245\u2013254. ACM Press, New York (2001)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-57332-1_11","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"K. Ohta","year":"1993","unstructured":"Ohta, K., Okamoto, T.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 139\u2013148. Springer, Heidelberg (1993)"},{"issue":"1","key":"18_CR20","first-page":"21","volume":"E82-A","author":"K. Ohta","year":"1999","unstructured":"Ohta, K., Okamoto, T.: Multisignature schemes secure against active insider attacks. IEICE Trans. Fundamentals\u00a0E82-A(1), 21\u201331 (1999)","journal-title":"IEICE Trans. Fundamentals"},{"key":"18_CR21","unstructured":"Ohta, K., Okamoto, T.: Generic construction methods of multi-signature schemes. In: Proceedings of The 2001 Symposium on Cryptography and Information Security (SCIS 2001), vol.\u00a0I, pp. 31\u201336 (2001)"},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems\u00a06(4), 432\u2013441 (1988)","journal-title":"ACM Trans. Computer Systems"},{"issue":"2","key":"18_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"18_CR24","unstructured":"Shimbo, A.: Multisignature Schemes Based on the ElGamal Scheme. In: Proc. of The 1994 Symposium on Cryptography and Information Security, January 27 - 29 (1994)"},{"issue":"1","key":"18_CR25","first-page":"73","volume":"E86-A","author":"M. Tada","year":"2003","unstructured":"Tada, M.: A secure multisignature scheme with signing order Verifiability. IEICE transactions on fundamentals\u00a0E86-A(1), 73\u201388 (2003); Previous version: M. Tada: An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. In: ACISP 2002, pp. 328\u2013345 (2002)","journal-title":"IEICE transactions on fundamentals"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11602897_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:15:18Z","timestamp":1566764118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11602897_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309345","9783540320999"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11602897_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}