{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:44:40Z","timestamp":1743137080684,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319175324"},{"type":"electronic","value":"9783319175331"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17533-1_14","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T12:50:20Z","timestamp":1428497420000},"page":"192-206","source":"Crossref","is-referenced-by-count":3,"title":["Batch Blind Signatures on Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Yang","family":"Sun","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45961-8_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"G.B. Agnew","year":"1988","unstructured":"Agnew, G.B., Mullin, R.C., Vanstone, S.A.: Fast Exponentiation in GF(2\n                      n\n                    ). In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 251\u2013255. Springer, Heidelberg (1988)"},{"issue":"8","key":"14_CR2","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/12.238495","volume":"42","author":"S. Arno","year":"1993","unstructured":"Arno, S., Wheeler, F.S.: Signed Digit Representations of Minimal Hamming Weight. IEEE Transactions on Computers\u00a042(8), 1007\u20131010 (1993)","journal-title":"IEEE Transactions on Computers"},{"key":"14_CR3","unstructured":"Avanzi, R.M.: On multi-exponentiation in cryptography. Cryptology ePrint Archive, Report 2002\/154 (2002)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 236\u2013250. Springer, Heidelberg (1998)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Bos, J.N.E., Coster, M.J.: Addition Chain Heuristics. In: Brassard, G. (ed.) Advances in Cryptology\u2013CRYPTO 1989. LNCS, vol.\u00a0435, pp. 400\u2013407. Springer, Heidelberg (1990)","DOI":"10.1007\/0-387-34805-0_37"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast Exponentiation with Precomputation (Extended Abstract). In: Rueppel, R.A. (ed.) Advances in Cryptology\u2013EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 200\u2013207. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-47555-9_18"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s00145-011-9108-z","volume":"25","author":"J. Camenisch","year":"2012","unstructured":"Camenisch, J., Hohenberger, S., Pedersen, M.\u00d8.: Batch Verification of Short Signatures. Journal of Cryptology\u00a025(4), 723\u2013747 (2012)","journal-title":"Journal of Cryptology"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology\u2013CRYPTO 1982, pp. 199\u2013203. Springer US (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"14_CR9","unstructured":"Cheon, J.H., Kim, Y., Yoon, H.: A New ID-based Signature with Batch Verification. Cryptology ePrint Archive, Report 2004\/131 (2004)"},{"issue":"15","key":"14_CR10","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1016\/j.ipl.2009.04.008","volume":"109","author":"B. Chung","year":"2009","unstructured":"Chung, B., Hur, J., Kim, H., Hong, S.M., Yoon, H.: Improved batch exponentiation. Information Processing Letters\u00a0109(15), 832\u2013837 (2009)","journal-title":"Information Processing Letters"},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/12.833110","volume":"49","author":"V.S. Dimitrov","year":"2000","unstructured":"Dimitrov, V.S., Jullien, G.A., Miller, W.C.: Complexity and fast algorithms for multiexponentiations. IEEE Transactions on Computers\u00a049(2), 141\u2013147 (2000)","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"10","author":"P. Downey","year":"1981","unstructured":"Downey, P., Leong, B., Sethi, R.: Computing sequences with addition chains. SIAM Journal on Computing\u00a010(3), 638\u2013646 (1981)","journal-title":"SIAM Journal on Computing"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology\u2013CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)","DOI":"10.1007\/3-540-39568-7_2"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-00862-7_21","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"A.L. Ferrara","year":"2009","unstructured":"Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.\u00d8.: Practical Short Signature Batch Verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 309\u2013324. Springer, Heidelberg (2009)"},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Hong, S.-M., Oh, S.-Y., Yoon, H.: New Modular Multiplication Algorithms for Fast Modular Exponentiation. In: Maurer, U.M. (ed.) Advances in Cryptology\u2013EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 166\u2013177. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68339-9_15"},{"issue":"7","key":"14_CR17","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"M. Joye","year":"2000","unstructured":"Joye, M., Yen, S.M.: Optimal left-to-right binary signed-digit recoding. IEEE Transactions on Computers\u00a049(7), 740\u2013748 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"14_CR18","unstructured":"Knuth, D.E.: The Art of Computer Programming\u2013Volume 2: Seminumerical Algorithms. Addison-Wesley Professional (2014)"},{"issue":"177","key":"14_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"issue":"12","key":"14_CR20","doi-asserted-by":"publisher","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"C.T. Li","year":"2008","unstructured":"Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications\u00a031(12), 2803\u20132814 (2008)","journal-title":"Computer Communications"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Lim, C.H., Lee, P.J.: More Flexible Exponentiation with Precomputation. In: Desmedt, Y.G. (ed.) Advances in Cryptology\u2013CRYPTO 1994. LNCS, vol.\u00a0839, pp. 95\u2013107. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48658-5_11"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.amc.2006.06.089","volume":"185","author":"D.C. Lou","year":"2007","unstructured":"Lou, D.C., Lai, J.C., Wu, C.L., Chang, T.J.: An efficient montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques. Applied Mathematics and Computation\u00a0185(1), 31\u201344 (2007)","journal-title":"Applied Mathematics and Computation"},{"issue":"5","key":"14_CR23","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory\u00a039(5), 1639\u20131646 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-45537-X_13","volume-title":"Selected Areas in Cryptography","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 165\u2013180. Springer, Heidelberg (2001)"},{"issue":"170","key":"14_CR25","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"14_CR26","first-page":"58","volume-title":"Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996","author":"D. M\u2019Ra\u00efhi","year":"1996","unstructured":"M\u2019Ra\u00efhi, D., Naccache, D.: Batch Exponentiation: A Fast DLP-based Signature Generation Strategy. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 58\u201361. ACM, New York (1996)"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 31\u201353. Springer, Heidelberg (1993)"},{"issue":"2","key":"14_CR28","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1137\/0209022","volume":"9","author":"N. Pippenger","year":"1980","unstructured":"Pippenger, N.: On the evaluation of powers and monomials. SIAM Journal on Computing\u00a09(2), 230\u2013250 (1980)","journal-title":"SIAM Journal on Computing"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/BFb0053453","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"P. de Rooij","year":"1995","unstructured":"de Rooij, P.: Efficient exponentiation using precomputation and vector addition chains. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 389\u2013399. Springer, Heidelberg (1995)"},{"key":"14_CR30","unstructured":"Solinas, J.: Low-weight binary representations for pairs of integers. Tech. rep., CORR 2001-41, Department of C&O, University of Waterloo (2001)"},{"issue":"4","key":"14_CR31","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1137\/0219049","volume":"19","author":"D.R. Stinson","year":"1990","unstructured":"Stinson, D.R.: Some Observations on Parallel Algorithms for Fast Exponentiation in GF(2^n). SIAM Journal on Computing\u00a019(4), 711\u2013717 (1990)","journal-title":"SIAM Journal on Computing"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan, X.: Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol.\u00a08712, pp. 326\u2013343. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-319-11203-9_19"},{"issue":"6","key":"14_CR33","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/ip-cdt:19941271","volume":"141","author":"S.M. Yen","year":"1994","unstructured":"Yen, S.M., Laih, C.S., Lenstra, A.K.: Multi-exponentiation (cryptographic protocols). Computers and Digital Techniques\u00a0141(6), 325\u2013326 (1994)","journal-title":"Computers and Digital Techniques"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.-H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th Conference on Computer Communications on INFOCOM 2008, pp. 816\u2013824. IEEE (April 2008)","DOI":"10.1109\/INFOCOM.2008.58"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17533-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:44:18Z","timestamp":1676940258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17533-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319175324","9783319175331"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17533-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}