{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:23Z","timestamp":1725484343716},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_26","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"328-345","source":"Crossref","is-referenced-by-count":3,"title":["An Order-Specified Multisignature Scheme Secure against Active Insider Attacks"],"prefix":"10.1007","author":[{"given":"Mitsuru","family":"Tada","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway: \u201cRandom oracles are practical: a paradigm for designing efficient protocols\u201d, Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS), 1993.","key":"26_CR1","DOI":"10.1145\/168588.168596"},{"doi-asserted-by":"crossref","unstructured":"H. L. Bodlaender and B. de Fluiter: \u201cParallel algorithm for series parallel graphs\u201d, Europian Symposium on Algorithms, pp. 277\u2013289, 1996.","key":"26_CR2","DOI":"10.1007\/3-540-61680-2_62"},{"key":"26_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/978-3-540-46588-1_31","volume-title":"Proceedings of PKC2000","author":"M. Burmester","year":"2000","unstructured":"M. Burmester, Y. Desmedt, H. Doi, M. Mambo, E. Okamoto, M. Tada and Y. Yoshifuji: \u201cA structured ElGamal-type multisignature scheme\u201d, Proceedings of PKC2000, Lecture Notes in Computer Science 1751, pp. 466\u2013483, Springer-Verlag, 2000."},{"key":"26_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/10718964_29","volume-title":"Proceedings of ACISP2000","author":"H. Doi","year":"2000","unstructured":"H. Doi, M. Mambo and E. Okamoto: \u201cOn the security of the RSA-based multisignature scheme for various group structure\u201d, Proceedings of ACISP2000, Lecture Notes in Computer Science 1841, pp. 352\u2013367, Springer-Verlag, 2000."},{"key":"26_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/10718964_25","volume-title":"Proceedings of ACISP2000","author":"S. Mitomi","year":"2000","unstructured":"S. Mitomi and A. Miyaji: \u201cA multisignature scheme with message flexibility, order flexibility and order verifiability\u201d, Proceedings of ACISP2000, Lecture Notes in Computer Science 1841, pp. 298\u2013312, Springer-Verlag, 2000."},{"issue":"1","key":"26_CR6","first-page":"22","volume":"82-A","author":"K. Ohta","year":"1999","unstructured":"K. Ohta and T. Okamoto: \u201cMulti-signature schemes secure against active insider attacks\u201d, IEICE transactions of fundamentals, vol. 82-A, no. 1, pp. 22\u201331, 1999.","journal-title":"IEICE transactions of fundamentals"},{"key":"26_CR7","first-page":"31","volume":"I","author":"K. Ohta","year":"2001","unstructured":"K. Ohta and T. Okamoto: \u201cGeneric construction methods of multi-signature schemes\u201d, Proceedings of The 2001 Symposium on Cryptography and Information Security (SCIS2001), vol. I, pp. 31\u201336, 2001.","journal-title":"Proceedings of The 2001 Symposium on Cryptography and Information Security (SCIS2001)"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern: \u201cSecurity arguments for digital signatures and blind signatures\u201d, Journal of cryptology, vol. 13, no. 3, pp. 361\u2013396, Springer-Verlag, 2000.","journal-title":"Journal of cryptology"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr: \u201cEfficient signature generation by smart cards\u201d, Journal of cryptology, vol. 4, pp. 161\u2013174, Springer-Verlag, 1991.","journal-title":"Journal of cryptology"},{"unstructured":"A. Shimbo: \u201cDesign of a modified ElGamal signature scheme\u201d, Workshop on Design and Evaluation of Cryptographic Algorithms, pp. 37\u201344, 1996.","key":"26_CR10"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T14:39:17Z","timestamp":1550327957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}