{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:50:45Z","timestamp":1742399445892},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_6","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"75-89","source":"Crossref","is-referenced-by-count":3,"title":["On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme"],"prefix":"10.1007","author":[{"given":"Guilin","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Crypto\u20192000","author":"G. Ateniese","year":"2000","unstructured":"G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practicala nd provably secure coalition-resistant group signature scheme. In: Crypto\u20192000, LNCS 1880, pp. 255\u2013270. Springer-Verlag, 2000. 76, 77"},{"key":"6_CR2","unstructured":"G. Ateniese, M. Joye, and G. Tsudik. On the dificulty of coalition-resistant in group signature schemes. In: Second Workshop on Security in Communication Networks (SCN\u201999), September 1999. 76, 77"},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-48390-X_15","volume-title":"Financial Cryptography (FC\u201999)","author":"G. Ateniese","year":"1999","unstructured":"G. Ateniese, and G. Tsudik. Some open issues and new directions in group signature schemes. In: Financial Cryptography (FC\u201999), LNCS 1648, pp. 196\u2013211. Springer-Verlag, 1999. 76, 77, 81"},{"key":"6_CR4","unstructured":"C. Boyd. Digitalm ultisignatures. In: Cryptography and Coding, pp. 241\u2013246. Oxford University Press, 1989. 76"},{"key":"6_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-69053-0_32","volume-title":"Eurocrypt\u201997","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch. Efficient and generalized group signatures. In: Eurocrypt\u201997, LNCS 1233, pp. 465\u2013479. Springer-Verlag, 1997. 76, 77"},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Crypto\u201997","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch, and M. Stadler. Efficient group signature schemes for large groups. In: Crypto\u201997, LNCS 1294, pp. 410\u2013424. Springer-Verlag, 1997. 76, 77"},{"key":"6_CR7","volume-title":"ETH-Series in Information Security an Cryptography","author":"J. Camenisch","year":"1998","unstructured":"J. Camenisch. Group signature schemes and payment systems based on the discrete logarithm problem. Vol. 2 ofETH-Series in Information Security an Cryptography, ISBN 3-89649-286-1, Hartung-Gorre Verlag, Konstanz, 1998. 76, 77"},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"Crypto\u201999","author":"J. Camenisch","year":"1999","unstructured":"J. Camenisch, and M. Michels. Separability and efficiency for generic group signature schemes. In: Crypto\u201999, LNCS 1666, pp. 413\u2013430. Springer-Verlag, 1999. 76, 77"},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-45708-9_5","volume-title":"Crypto\u20192002","author":"J. Camenisch","year":"2002","unstructured":"J. Camenisch, and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Crypto\u20192002, LNCS 2442, pp. 61\u201376. Springer-Verlag, 2002."},{"key":"6_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Eurocrypt\u201991","author":"D. Chaum","year":"1991","unstructured":"D. Chaum, E. van Heyst. Group signatures. In: Eurocrypt\u201991, LNCS 547, pp. 257\u2013265. Springer-Verlag, 1991. 75, 77"},{"key":"6_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/BFb0053433","volume-title":"Eurocrypt\u201994","author":"L. Chen","year":"1995","unstructured":"L. Chen, and T.P. Pedersen. New group signature schemes. In: Eurocrypt\u201994, LNCS 950, pp. 171\u2013181. Springer-Verlag, 1995. 76, 77"},{"key":"6_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-49264-X_4","volume-title":"Eurocrypt\u201995","author":"L. Chen","year":"1995","unstructured":"L. Chen, and T. P. Pedersen. On the efficiency of group signatures providing information-theoretic anonymity. In: Eurocrypt\u201995, LNCS 921, pp. 39\u201349. Springer-Verlag, 1995. 76, 77"},{"key":"6_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Crypto\u201987","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt. Society and group oriented cryptography: a new concept. In Crypto\u201987, LNCS 293, pp.120\u2013127. Springer-Verlag, 1988. 76"},{"key":"6_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Crypto\u201989","author":"Y. Desmedt","year":"1990","unstructured":"Y. Desmedt, and Y. Frankel. Threshold cryptosystems. In Crypto\u201989, LNCS 435, pp. 307\u2013315. Springer-Verlag, 1990. 76"},{"key":"6_CR15","series-title":"Lect Notes Comput Sci","first-page":"244","volume-title":"Auscrypt\u201992","author":"A. Fujioka","year":"1992","unstructured":"A. Fujioka, T. Okamoto, and K. Ohta. A practicald igital multisignature scheme based on discrete logarithms. In: Auscrypt\u201992, LNCS 718, pp. 244\u2013251. Springer-Verlag, 1992. 76"},{"key":"6_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-68339-9_31","volume-title":"Eurocrypt\u201996","author":"R. Gennaro","year":"1996","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In: Eurocrypt\u201996, LNCS1070, pp. 354\u2013371. Springer-Verlag, 1996. 76"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"L. Harn. Group-oriented (t, n) threshold digital signature scheme and multisignature. IEE Proceedings-Computers and Digital Techniques, 1994, 141(5): 307\u2013313. 76","DOI":"10.1049\/ip-cdt:19941293"},{"issue":"5","key":"6_CR18","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1049\/el:19940317","volume":"30","author":"L. Harn","year":"1994","unstructured":"L. Harn. New digitalsign ature scheme based on discrete logarithm. Electronic Letters, 1994, 30(5): 396\u2013398. 76","journal-title":"Electronic Letters"},{"key":"6_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/3-540-57220-1_57","volume-title":"Auscrypt\u201992","author":"L. Harn","year":"1993","unstructured":"L. Harn, and S. Yang. Group-oriented undeniable signature schemes without the assistance of a mutually trusted party. In Auscrypt\u201992, LNCS 718, pp.133\u2013142. Springer-Verlag, 1993. 76"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"P. Horster, M. Michels, and H. Petersen. Meta-multisignature schemes based on the discrete logarithm problem. In Proc. of IFIP\/SEC\u201995, pp. 128\u2013141. Chapman & Hall, 1995. 76","DOI":"10.1007\/978-0-387-34873-5_11"},{"key":"6_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-47790-X_23","volume-title":"Information Security (ISW\u201999)","author":"M. Joye","year":"1999","unstructured":"M. Joye, S. Kim, and N-Y. Lee. Cryptanalysis of two group signature schemes. In: Information Security (ISW\u201999), LNCS 1729, pp. 271\u2013275. Springer-Verlag, 1999. 76"},{"key":"6_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-47790-X_5","volume-title":"Information Security (ISW\u201999)","author":"M. Joye","year":"1999","unstructured":"M. Joye, N-Y. Lee, and T. Hwang. On the security of the Lee-Chang group signature scheme and its derivatives. In: Information Security (ISW\u201999), LNCS 1729, pp. 47\u201351. Springer-Verlag, 1999. 76"},{"key":"6_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45247-8_12","volume-title":"Information Security and Cryptology (ICISC 2000)","author":"H.-J. Kim","year":"2001","unstructured":"H-J. Kim, J. I. Lim, and D.H. Lee. Efficient and secure member deletion in group signature schemes. In: Information Security and Cryptology (ICISC 2000), LNCS 2015, pp. 150\u2013161. Springer-Verlag, 2001. 76"},{"key":"6_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-68697-5_6","volume-title":"Crypto\u201996","author":"S. K. Langford","year":"1996","unstructured":"S. K. Langford.Weaknesses in some threshold cryptosystems. In Crypto\u201996, LNCS 1109, pp.74\u201382. Springer-Verlag, 1996. 76"},{"key":"6_CR25","series-title":"Lect Notes Comput Sci","first-page":"194","volume-title":"Eurocrypt\u201994","author":"C.-M. Li","year":"1995","unstructured":"C-M. Li, T. Hwang and N-Y. Lee. Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Eurocrypt\u201994, LNCS 950, pp. 194\u2013204. Springer-Verlag, 1995. 76, 77, 87"},{"issue":"3","key":"6_CR26","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1080\/01611190008984245","volume":"24","author":"C.-M. Li","year":"2000","unstructured":"C-M. Li, T. Hwang, N-Y. Lee, and J-J. Tsai. (t, n) threshold-multisignature schemes and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders. Cryptologia, July 2000, 24(3): 250\u2013268. 76, 77, 79, 80, 81, 82, 87","journal-title":"Cryptologia"},{"key":"6_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/BFb0034859","volume-title":"Asiacrypt\u201996","author":"M. Michels","year":"1996","unstructured":"M. Michels, and P. Horster. On the risk of discruption in several multiparty signature schemes. In Asiacrypt\u201996, LNCS 1163, pp.334\u2013345. Springer-Verlag, 1996. 76, 77, 86, 87"},{"issue":"8","key":"6_CR28","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432\u2013441. 76","journal-title":"ACM Transactions on Computer Systems"},{"key":"6_CR29","series-title":"Lect Notes Comput Sci","first-page":"75","volume-title":"Asiacrypt\u201991","author":"T. Ohata","year":"1991","unstructured":"T. Ohata, and T. Okamoto. A digitalm ultisignature scheme based on the Fiat-Shamir scheme. In: Asiacrypt\u201991, LNCS 739, pp. 75\u201379. Springer-Verlag, 1991. 76"},{"issue":"1","key":"6_CR30","first-page":"86","volume":"E79-A","author":"C. Park","year":"1996","unstructured":"C. Park, and K. Kurosawa. New Elgamal type threshold digital signature scheme. IEICE Trans. Fundamentals, January 1996, E79-A(1): 86\u201393. 76","journal-title":"IEICE Trans. Fundamentals"},{"key":"6_CR31","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/BFb0026716","volume-title":"How to convert any digitalsign ature scheme into a group signature scheme","author":"H. Petersen","year":"1997","unstructured":"H. Petersen. How to convert any digitalsign ature scheme into a group signature scheme. In: Proc. of Security Protocols Workshop\u201997, LNCS 1361, pp. 67\u201378. Springer-Verlag, 1997. 76"},{"issue":"11","key":"6_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 1979, 22(11): 612\u2013613.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T15:37:19Z","timestamp":1556465839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}