{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:07Z","timestamp":1725470947190},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_11","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T06:36:57Z","timestamp":1159857417000},"page":"146-160","source":"Crossref","is-referenced-by-count":6,"title":["Formal Security Model of Multisignatures"],"prefix":"10.1007","author":[{"given":"Yuichi","family":"Komano","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Atsushi","family":"Shimbo","sequence":"additional","affiliation":[]},{"given":"Shinichi","family":"Kawamura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 614\u2013629. Springer, Heidelberg (2003)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proc. of the First ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of the First ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-540-30574-3_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M. Bellare","year":"2005","unstructured":"Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 136\u2013153. Springer, Heidelberg (2005)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiability encrypted signature form biliner maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-46035-7_18","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.-S. Coron","year":"2002","unstructured":"Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 272\u2013287. Springer, Heidelberg (2002)"},{"key":"11_CR8","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development\u00a0(71), 1\u20138 (1983)","journal-title":"NEC Research & Development"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Katz, J., Wang, N.: Eficiency improvements for signature schemes with tight security reductions. In: CCS 2003, 10th ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948129.948132"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45067-X_29","volume-title":"Information Security and Privacy","author":"K. Kawauchi","year":"2003","unstructured":"Kawauchi, K., Tada, M.: On the exact security of multisignature schemes based on RSA. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 336\u2013349. Springer, Heidelberg (2003)"},{"issue":"5","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1093\/ietfec\/e88-a.5.1274","volume":"E88\u2013A","author":"K. Kawauchi","year":"2005","unstructured":"Kawauchi, K., Tada, M.: On the security and the efficiency of multi-signature schemes based on a trapdoor one-way permutation. IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences\u00a0E88\u2013A(5), 1274\u20131282 (2005)","journal-title":"IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/11554868_10","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"Y. Komano","year":"2005","unstructured":"Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.-i.: On the Security of Probabilistic Multisignature Schemes and Their Optimality. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 132\u2013150. Springer, Heidelberg (2005)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 74\u201390. Springer, Heidelberg (2004)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures. In: CCS 2001, Eighth ACM Conference on Computer and Communications Security (2001)","DOI":"10.1145\/501983.502017"},{"key":"11_CR15","first-page":"2488","volume":"84","author":"S. Mitomi","year":"2001","unstructured":"Mitomi, S., Miyaji, A.: A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability. IEICE Transaction of fundamentals\u00a0E-84-A, 2488\u20132499 (2001)","journal-title":"IEICE Transaction of fundamentals"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-57332-1_11","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"K. Ohta","year":"1993","unstructured":"Ohta, K., Okamoto, T.: A digital multisignature scheme based on the fiat-shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 139\u2013148. Springer, Heidelberg (1993)"},{"issue":"1","key":"11_CR17","first-page":"21","volume":"E82\u2013A","author":"K. Ohta","year":"1999","unstructured":"Ohta, K., Okamoto, T.: Multi-signature schemes secure against active insider attacks. IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences\u00a0E82\u2013A(1), 21\u201331 (1999)","journal-title":"IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"8","key":"11_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Transactions on Comp. Systems\u00a06(8), 432\u2013441 (1988)","journal-title":"ACM Transactions on Comp. Systems"},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:19:39Z","timestamp":1605626379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11836810_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}