{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:49Z","timestamp":1742913829366,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319213552"},{"type":"electronic","value":"9783319213569"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21356-9_16","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T01:20:09Z","timestamp":1436923209000},"page":"237-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties"],"prefix":"10.1007","author":[{"given":"Jan C. A.","family":"van der Lubbe","sequence":"first","affiliation":[]},{"given":"Merel J.","family":"de Boer","sequence":"additional","affiliation":[]},{"given":"Zeki","family":"Erkin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-45708-9_27","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"J Algesheimer","year":"2002","unstructured":"Algesheimer, J., Camenisch, J.L., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417\u2013432. Springer, Heidelberg (2002)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/3-540-48071-4_38","volume-title":"Advances in Cryptology - CRYPTO 1992","author":"B Blakley","year":"1993","unstructured":"Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.L.: Threshold schemes with disenrollment. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 540\u2013548. Springer, Heidelberg (1993)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-48329-2_10","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"C Blundo","year":"1994","unstructured":"Blundo, C., Cresti, A., De Santis, A., Vaccaro, U.: Fully dynamic secret sharing schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110\u2013125. Springer, Heidelberg (1994)"},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1145\/502090.502094","volume":"48","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Efficient generation of shared RSA keys. J. ACM 48(4), 702\u2013722 (2001)","journal-title":"J. ACM"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/BFb0055749","volume-title":"Advances in Cryptology - CRYPTO 1998","author":"A Buldas","year":"1998","unstructured":"Buldas, A., Laud, P., Lipmaa, H., Villemson, J.: Time-stamping with binary linking schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 486\u2013501. Springer, Heidelberg (1998)"},{"key":"16_CR6","unstructured":"Cartrysse, K., van der Lubbe, J.: Providing privacy to agents in an untrustworthy environment. In: van Blarkom, G., Borking, J., Olk, J. (eds.) Handbook of privacy and privacy-enhancing technologies, pp. 79\u201396 (2003)"},{"key":"16_CR7","first-page":"1339","volume":"756\u2013759","author":"SZ Chai","year":"2013","unstructured":"Chai, S.Z., Zhang, Q.: A general threshold signature scheme based on elliptic curves. Adv. Mater. Res. 756\u2013759, 1339\u20131343 (2013)","journal-title":"Adv. Mater. Res."},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-44987-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"IB Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I.B., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 152\u2013165. Springer, Heidelberg (2001)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-11799-2_12","volume-title":"Theory of Cryptography","author":"I Damg\u00e5rd","year":"2010","unstructured":"Damg\u00e5rd, I., Mikkelsen, G.L.: Efficient, robust and constant-round distributed RSA key generation. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 183\u2013200. Springer, Heidelberg (2010)"},{"key":"16_CR10","unstructured":"Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications (1997)"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1986","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1986)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-45682-1_19","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"P-A Fouque","year":"2001","unstructured":"Fouque, P.-A., Stern, J.: Fully distributed threshold RSA under standard assumptions. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 310\u2013330. Springer, Heidelberg (2001)"},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R Gennaro","year":"2007","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51\u201383 (2007)","journal-title":"J. Cryptol."},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-68339-9_31","volume-title":"Advances in Cryptology - EUROCRYPT 1996","author":"R Gennaro","year":"1996","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354\u2013371. Springer, Heidelberg (1996)"},{"key":"16_CR15","unstructured":"Just, M.: Some timestamping protocol failures. In: Internet Society Symposium on Network and Distributed Network Security, San Diego, CA, USA, pp. 89\u201396, 11\u201313 March 1998"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/3-540-36178-2_12","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"J Katz","year":"2002","unstructured":"Katz, J., Yung, M.: Threshold cryptosystems based on factoring. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 192\u2013205. Springer, Heidelberg (2002)"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45861-1_25","volume-title":"Information Security and Cryptology - ICISC 2001","author":"K Kawauchi","year":"2002","unstructured":"Kawauchi, K., Minato, H., Miyaji, A., Tada, M.: A multi-signature scheme with signers\u2019 intentions secure against active attacks. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, p. 328. Springer, Heidelberg (2002)"},{"issue":"4","key":"16_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.csi.2011.01.004","volume":"33","author":"S Kim","year":"2011","unstructured":"Kim, S., Kim, J., Cheon, J.H., Ju, S.H.: Threshold signature schemes for ElGamal variants. Comput. Stand. Interfaces 33(4), 432\u2013437 (2011)","journal-title":"Comput. Stand. Interfaces"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/10718964_25","volume-title":"Information Security and Privacy","author":"S Mitomi","year":"2000","unstructured":"Mitomi, S., Miyaji, A.: A multisignature scheme with message flexibility, order flexibility and order verifiability. In: Dawson, E., Clark, A., Boyd, C. (eds.) Information Security and Privacy. Lecture Notes in Computer Science, vol. 1841, pp. 298\u2013312. Springer, Berlin Heidelberg (2000)"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)"},{"key":"16_CR21","first-page":"86","volume":"E79\u2013A(1)","author":"C Park","year":"1996","unstructured":"Park, C., Kurosawa, K.: New ElGamal type threshold digital signature scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E79\u2013A(1), 86\u201393 (1996)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"11","key":"16_CR22","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2006.248166","volume":"44","author":"G Perez","year":"2006","unstructured":"Perez, G., Gomez Skarmeta, A., Zeber, S., Spagnolo, J., Symchych, T.: Dynamic policy-based network management for a secure coalition environment. IEEE Commun. Mag. 44(11), 58\u201364 (2006)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"16_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signature and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"24","key":"16_CR24","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1049\/el:19941411","volume":"30","author":"HM Sun","year":"1994","unstructured":"Sun, H.M., Shieh, S.P.: Construction of dynamic threshold schemes. Electron. Lett. 30(24), 2023\u20132025 (1994)","journal-title":"Electron. Lett."},{"key":"16_CR25","volume-title":"Managing Identity and Access in the Defence Environment","author":"S Zeber","year":"2002","unstructured":"Zeber, S.: Managing Identity and Access in the Defence Environment. Defence Research and Development Canada, Ottawa (2002)"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/10958513_8","volume-title":"Information Security","author":"J Zhou","year":"2003","unstructured":"Zhou, J., Bao, F., Deng, R.: Validating digital signatures without TTP\u2019s time-stamping and certificate revocation. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 96\u2013110. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Information Security in the Balkans"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21356-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:45:53Z","timestamp":1676972753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21356-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319213552","9783319213569"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21356-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}