{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:09:04Z","timestamp":1725487744436},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426622"},{"type":"electronic","value":"9783540454397"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45439-x_6","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T17:44:53Z","timestamp":1185039893000},"page":"81-94","source":"Crossref","is-referenced-by-count":8,"title":["Lenient\/Strict Batch Verification in Several Groups"],"prefix":"10.1007","author":[{"given":"Fumitaka","family":"Hoshino","sequence":"first","affiliation":[]},{"given":"Masayuki","family":"Abe","sequence":"additional","affiliation":[]},{"given":"Tetsutaro","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","first-page":"302","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201993","author":"S. Brands","year":"1993","unstructured":"Brands, S.: Untraceable Off-line Cash in Wallet with Observers. In Stinson, D., ed.: Advances in Cryptology \u2014 CRYPTO\u201993. Volume 773 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1993) 302\u2013318"},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201995","author":"K. Sako","year":"1995","unstructured":"Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme \u2014 A practical solution to the implementation of a voting booth-. In Guillou, L.C., Quisquater, J.J., eds.: Advances in Cryptology\u2014EUROCRYPT\u201995. Volume 921 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1995) 393\u2013403"},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/BFb0054144","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M. Abe","year":"1998","unstructured":"Abe, M.: Universally verifiable mix-net with verification work independent of the number of mix-servers. In Nyberg, K., ed.: Advances in Cryptology \u2014 EUROCRYPT\u201998. Volume 1403 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1998) 437\u2013447"},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-48000-6_21","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201999","author":"M. Abe","year":"1999","unstructured":"Abe, M.: Mix-networks on Permutation Networks. In Lam, K., Okamoto, E., Xing, C., eds.: Advances in Cryptology \u2014 ASIACRYPT\u201999. Volume 1716 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1999) 258\u2013273"},{"key":"6_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-44586-2_23","volume-title":"Remarks on mix-network based on permutation network","author":"M. Abe","year":"2001","unstructured":"Abe, M., Hoshino, F.: Remarks on mix-network based on permutation network. In Kim, K., ed.: Public Key Cryptography 4thInternational Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001. Volume 1992 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (2001) 317\u2013324"},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BFb0053426","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"D. Naccache","year":"1995","unstructured":"Naccache, D., M\u2019Ra\u00efhi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A be Improved ?-Complexity Trade-Offs with the Digital Signature Standard-. In Santis, A.D., ed.: Advances in Cryptology-EUROCRYPT\u201994. Volume 950 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1995) 77\u201385"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/12.381963","volume":"44","author":"Y. Sung-Ming","year":"1995","unstructured":"Sung-Ming Yen, Chi-Sung Laih: Improved Digital Signature Suitable for Batch Verification. IEEE Transactions on Computers 44 (July 1995) 957\u2013959","journal-title":"IEEE Transactions on Computers"},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast Batch Verification for Modular Exponentiation and Digital Signatures. In Nyberg, K., ed.: Advances in Cryptology \u2014 EUROCRYPT\u201998. Volume 1403 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1998) 236\u2013250"},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-44448-3_5","volume-title":"Advances in Cryptology-ASIACRYPT2000","author":"C. Boyd","year":"2000","unstructured":"Boyd, C., Pavlovski, C.: Attacking and Repairing Batch Verification Schemes. In Okamoto, T., ed.: Advances in Cryptology-ASIACRYPT2000. Volume 1976 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (2000) 58\u201371"},{"key":"6_CR10","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press (1997)"},{"key":"6_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201992","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Brickell, E.F., ed.: Advances in Cryptology \u2014 CRYPTO\u201992. Volume 740 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1993) 31\u201353"},{"key":"6_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In Ohta, K., Pei, D., eds.: Advances in Cryptology \u2014 ASIACRYPT\u201998. Volume 1514 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1998) 51\u201365"},{"key":"6_CR13","unstructured":"NIST: Recommended Elliptic Curves for Federal Government Use (1999) (available at \n                    \n                      http:\/\/csrc.nist.gov\/csrc\/fedstandards.html\/\n                    \n                    \n                  )."},{"key":"6_CR14","unstructured":"Seroussi, C.: Compact Representation of Elliptic Curve Points over \n                    \n                      \n                    \n                    $$\n\\mathbb{F}_{2^n } \n$$\n                   (April 1998) Research Manuscript, Hewlett-Packard Laboratories"},{"key":"6_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201991","author":"N. Koblitz","year":"1992","unstructured":"Koblitz, N.: CM-Curves with Good Cryptographic Properties. In Feigenbaum, J., ed.: Advances in Cryptology \u2014 CRYPTO\u201991. Volume 576 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1992) 279\u2013287"},{"key":"6_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-48910-X_13","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201999","author":"T. Kobayashi","year":"1999","unstructured":"Kobayashi, T., Morita, H., Kobayashi, K., Hoshino, F.: Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. In Stern, J., ed.: Advances in Cryptology \u2014 EUROCRYPT\u201999. Volume 1592 of Lecture Notes in Computer Science., Berlin; Heidelberg; New York, Springer-Verlag (1999) 176\u2013189 (A preliminary version was written in Japanese and presented at SCIS\u201999-W4-1.4)."},{"key":"6_CR17","unstructured":"Knuth, D.E.: Seminumerical Algorithms. Third edn. Volume 2 of The Art of Computer Programming. Addison Wesley (1997)"},{"key":"6_CR18","unstructured":"IEEE P1363\/D13 (Draft Version 13): Standard Specifications for Public Key Cryptography Annex E(Informative) Formats (1999) (available at \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/P1363\/draft.html\n                    \n                    \n                  )."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45439-X_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T05:54:20Z","timestamp":1550469260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45439-X_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426622","9783540454397"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45439-x_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}