{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:47:10Z","timestamp":1742392030393},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540420705"},{"type":"electronic","value":"9783540449874"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44987-6_27","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T09:46:47Z","timestamp":1186825607000},"page":"437-452","source":"Crossref","is-referenced-by-count":22,"title":["Lower Bounds for Multicast Message Authentication"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Glenn","family":"Durfee","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Franklin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,4,15]]},"reference":[{"key":"27_CR1","first-page":"708","volume":"2","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, \u201cMulticast Security: A taxonomy and some efficient constructions\u201d, in IEEE INFOCOM'99, vol. 2, pp. 708\u2013716, 1999.","journal-title":"IEEE INFOCOM'99"},{"key":"27_CR2","series-title":"Lect Notes Comput Sci","first-page":"412","volume-title":"On the design of provably-secure cryptographic hash functions","author":"A. Santis De","year":"1990","unstructured":"A. De Santis and M. Yung, \u201cOn the design of provably-secure cryptographic hash functions\u201d, in Proc. of Eurocrypt '90, LNCS 473, pp. 412\u2013431, 1990."},{"unstructured":"Y. Desmedt, Y. Frankel, and M. Yung, \u201cMulti-receiver\/Multi-sender network security: efficient authenticated multicast\/feedback\u201d, in IEEE INFOCOM '92, pp. 2045\u20132054, 1992.","key":"27_CR3"},{"issue":"4","key":"27_CR4","first-page":"502","volume":"E79-A","author":"F. Fujii","year":"1996","unstructured":"F. Fujii, W. Kachen, and K. Kurosawa, \u201cCombinatorial bounds and design of broadcast authentication\u201d, in IEICE Trans., vol. E79-A, no. 4, pp. 502\u2013506, 1996.","journal-title":"IEICE Trans."},{"doi-asserted-by":"crossref","unstructured":"R. Gennaro and P. Rohatgi, \u201cHow to sign digital streams\u201d, in Proc. of Crypto '97, 1997.","key":"27_CR5","DOI":"10.1007\/BFb0052235"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest, \u201cA digital signature scheme secure against adaptive chosen-message attacks\u201d, SIAM Journal of Computing, vol. 17, pp. 281\u2013308, 1988.","journal-title":"SIAM Journal of Computing"},{"unstructured":"P. Golle, N. Modadugo, \u201cStreamed authentication in the presence of random packet loss\u201d, in Proc..of 8th Annual Internet Society Symposium on Network and Distributed System Security (NDSS '01), San Diego, 2001.","key":"27_CR7"},{"key":"27_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0027927","volume-title":"Information Security and Privacy, ACISP '97","author":"K. Kurosawa","year":"1997","unstructured":"K. Kurosawa, S. Obana, \u201cCharacterization of (k, n) multi-receiver authentication\u201d, in Information Security and Privacy, ACISP '97, LNCS 1270, pp. 205\u2013215, 1997."},{"doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, \u201cUniversal one-way hash functions and their cryptographic applications\u201d, in Proc. of 21st Annual ACM Symposium on Theory of Computing, pp. 33\u201343, 1989.","key":"27_CR9","DOI":"10.1145\/73007.73011"},{"unstructured":"A. Perrig, R. Canetti, D. Tygar, D. Song, \u201cEfficient Authentication and Signature of Multicast Streams over Lossy Channels\u201d, in Proc. of 2000 IEEE Symposium on Security and Privacy, Oakland, 2000.","key":"27_CR10"},{"unstructured":"A. Perrig, R. Canetti, D. Song, D. Tygar, \u201cEfficient and Secure Source Authentication for Multicast\u201d, in Proc. of 8th Annual Internet Society Symposium on Network and Distributed System Security (NDSS '01), San Diego, 2001.","key":"27_CR11"},{"doi-asserted-by":"crossref","unstructured":"P. Rohatgi, \u201cA compact and fast hybrid signature scheme for multicast packet authentication\u201d, in Proc. of 6th ACM conference on Computer and Communication Security, 1999.","key":"27_CR12","DOI":"10.1145\/319709.319722"},{"doi-asserted-by":"crossref","unstructured":"J. Rompel, \u201cOne-way functions are necessary and sufficient for secure signatures\u201d, in Proc. of 22nd Annual ACM Symposium on Theory of Computing, pp. 387\u2013394, 1990.","key":"27_CR13","DOI":"10.1145\/100216.100269"},{"issue":"1\/2","key":"27_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1006\/inco.1998.2769","volume":"151","author":"R. Safavi-Naini","year":"1999","unstructured":"R. Safavi-Naini, H. Wang, \u201cMultireceiver authentication codes: models, bounds, constructions and extensions\u201d, Information and Computation, vol. 151, no. 1\/2, pp. 148\u2013172, 1999.","journal-title":"Information and Computation"},{"key":"27_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/BFb0054151","volume-title":"New results on multireceiver authentication codes","author":"R. Safavi-Naini","year":"1998","unstructured":"R. Safavi-Naini, H. Wang, \u201cNew results on multireceiver authentication codes\u201d, in Proc. of Eurocrypt '98, LNCS 1403, pp. 527\u2013541, 1998."},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G. Simmons","year":"1990","unstructured":"G. Simmons, \u201cA cartesian product construction for unconditionally secure authentication codes that permit arbitration\u201d, J. Cryptology, vol. 2, no. 2, pp. 77\u2013104, 1990.","journal-title":"J. Cryptology"},{"unstructured":"C. K. Wong, S. S. Lam, \u201cDigital signatures for flows and multicasts\u201d, IEEE ICNP '98. Also, University of Texas Austin, Computer Science Technical report TR 98-15.","key":"27_CR17"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44987-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:23:09Z","timestamp":1556738589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44987-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540420705","9783540449874"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-44987-6_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}