{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:58:22Z","timestamp":1725796702618},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083438"},{"type":"electronic","value":"9783319083445"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08344-5_10","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T06:38:15Z","timestamp":1404455895000},"page":"148-161","source":"Crossref","is-referenced-by-count":2,"title":["A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012"],"prefix":"10.1007","author":[{"given":"Yanbin","family":"Pan","sequence":"first","affiliation":[]},{"given":"Yingpu","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Tom, M.: Apostol: Introduction to Analytic Number Theory. Springer (1976)","DOI":"10.1007\/978-1-4757-5579-4"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-13013-7_28","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"A. Bagherzandi","year":"2010","unstructured":"Bagherzandi, A., Jarecki, S.: Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 480\u2013498. Springer, Heidelberg (2010)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P.S.L.M. Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 515\u2013532. Springer, Heidelberg (2005)"},{"key":"10_CR4","unstructured":"Boldyreva, A., Gentry, C., ONeill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36288-6_2","volume-title":"Public Key Cryptography - PKC 2003","author":"J.C. Cha","year":"2002","unstructured":"Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 18\u201330. Springer, Heidelberg (2002)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, X., Liu, J., Wang, X.: Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part IV. LNCS, vol.\u00a03483, pp. 1046\u20131054. Springer, Heidelberg (2005)","DOI":"10.1007\/11424925_109"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-02384-2_9","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"D. Galindo","year":"2009","unstructured":"Galindo, D., Garcia, F.D.: A Schnorr-Like Lightweight Identity-Based Signature Scheme. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 135\u2013148. Springer, Heidelberg (2009)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C., Ramzan, Z.: Identity-Based Aggregate Signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 257\u2013273. Springer, Heidelberg (2006)"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1093\/comjnl\/bxh153","volume":"49","author":"J. Herranz","year":"2006","unstructured":"Herranz, J.: Deterministic identity-based signatures for partial aggregation. The Computer Journal\u00a049(3), 322\u2013330 (2006)","journal-title":"The Computer Journal"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Hwang, J.Y., Lee, D.H., Yung, M.: Universal forgery of the identity-based sequential aggregate signature scheme. In: Computer and Communications Security, ASIACCS 2009, pp. 157\u2013160. ACM (2009)","DOI":"10.1145\/1533057.1533080"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ipl.2013.11.005","volume":"114","author":"P. Nose","year":"2014","unstructured":"Nose, P.: Security weaknesses of a signature scheme and authenticated key agreement protocols. Information Processing Letters\u00a0114, 107\u2013115 (2014)","journal-title":"Information Processing Letters"},{"key":"10_CR12","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, pp. 135\u2013148 (2000)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-25141-2_6","volume-title":"Advances in Information and Computer Security","author":"S. Sharmila Deva Selvi","year":"2011","unstructured":"Sharmila Deva Selvi, S., Sree Vivek, S., Pandu Rangan, C.: Identity-Based Deterministic Signature Scheme without Forking-Lemma. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol.\u00a07038, pp. 79\u201395. Springer, Heidelberg (2011)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-31448-3_21","volume-title":"Information Security and Privacy","author":"S. Sharmila Deva Selvi","year":"2012","unstructured":"Sharmila Deva Selvi, S., Sree Vivek, S., Pandu Rangan, C.: Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol.\u00a07372, pp. 280\u2013293. Springer, Heidelberg (2012)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology - CRYPT0 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)","DOI":"10.1007\/3-540-39568-7_5"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08344-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T02:51:26Z","timestamp":1558925486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08344-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083438","9783319083445"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08344-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}