{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T12:35:09Z","timestamp":1763987709935},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_26","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"367-377","source":"Crossref","is-referenced-by-count":3,"title":["An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles"],"prefix":"10.1007","author":[{"given":"Naoto","family":"Yanai","sequence":"first","affiliation":[]},{"given":"Masahiro","family":"Mambo","sequence":"additional","affiliation":[]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahn, J.H., Green, M., Hohenberger, S.: Synchronized aggregate signatures: new definitions, constructions and applications. In: Proceedings of the ACM CCS 2011, pp. 473\u2013484. ACM (2010)","key":"26_CR1","DOI":"10.1145\/1866307.1866360"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Gentry, C., O\u2019Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing (extended abstract). In: Proceedings of ACM CCS 2007, pp. 276\u2013285. ACM (2007)","key":"26_CR3","DOI":"10.1145\/1315245.1315280"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"issue":"4","key":"26_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1452335.1452337","volume":"38","author":"Y-J Chi","year":"2008","unstructured":"Chi, Y.-J., Oliveira, R., Zhang, L.: Cyclops: the as-level connectivity observatory. ACM Sigcomm Comput. Commun. Rev. 38(4), 5\u201316 (2008)","journal-title":"ACM Sigcomm Comput. Commun. Rev."},{"key":"26_CR6","first-page":"43","volume":"98","author":"H Doi","year":"1998","unstructured":"Doi, H., Mambo, M., Okamoto, E.: Multisignature schemes using structured group id. Tech. Rep. IEICE 98, 43\u201348 (1998). IEICE","journal-title":"Tech. Rep. IEICE"},{"unstructured":"Feamster, N., Balakrishnan, H., Rexford, J.: Some foundational problems in interdomain routing. In: Proceedings of HotNets-3 2004. ACM (2004)","key":"26_CR7"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-40041-4_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"S Hohenberger","year":"2013","unstructured":"Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494\u2013512. Springer, Heidelberg (2013)"},{"key":"26_CR9","first-page":"1","volume":"71","author":"K Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multi-signatures. NEC Res. Dev. 71, 1\u20138 (1983)","journal-title":"NEC Res. Dev."},{"issue":"3","key":"26_CR10","first-page":"929","volume":"52","author":"A Kanaoka","year":"2011","unstructured":"Kanaoka, A., Okada, M., Katsuno, Y., Okamoto, E.: Probabilistic packet marking method considering topology property for efficiency re-building dos attack paths. TIPSJ 52(3), 929\u2013939 (2011)","journal-title":"TIPSJ"},{"issue":"4","key":"26_CR11","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/49.839934","volume":"18","author":"S Kent","year":"2000","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure border gateway protocol. IEEE J. Sel. Areas Commun. 18(4), 582\u2013592 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-642-36362-7_26","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"K Lee","year":"2013","unstructured":"Lee, K., Lee, D.H., Yung, M.: Sequential aggregate signatures with short public keys: design, analysis and implementation studies. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 423\u2013442. Springer, Heidelberg (2013)"},{"unstructured":"Lepinski, M., Turner, S.L: An overview of bgpsec. Internet Draft (2011). \n                      http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-overview-01","key":"26_CR13"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/11761679_28","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"S Lu","year":"2006","unstructured":"Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465\u2013485. Springer, Heidelberg (2006)"},{"unstructured":"Lynn, B.: Pbc library (2013). \n                      http:\/\/crypto.stanford.edu\/pbc\/","key":"26_CR15"},{"doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: extended abstract. In: Proceedings of ACM CCS 2001, pp. 245\u2013254. ACM (2001)","key":"26_CR16","DOI":"10.1145\/501983.502017"},{"issue":"A(1)","key":"26_CR17","first-page":"21","volume":"E82","author":"K Ohta","year":"1999","unstructured":"Ohta, K., Okamoto, T.: Multi-signature schemes secure against active insider attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E82(A(1)), 21\u201331 (1999)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"unstructured":"Sriram, K., Borchert, O., Kim, O., Cooper, D., Montgomery, D.: Rib size estimation for bgpsec. IETF SIDR WG Meeting, IETF 81 (2011). \n                      http:\/\/www.antd.nist.gov\/ksriram\/BGPSEC_RIB_Estimation.pdf","key":"26_CR18"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"B Waters","year":"2009","unstructured":"Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)"},{"issue":"2","key":"26_CR21","first-page":"366","volume":"55","author":"N Yanai","year":"2014","unstructured":"Yanai, N., Chida, E., Mambo, M., Okamoto, E.: A cdh-based ordered multisignature scheme provably secure without random oracles. JIP 55(2), 366\u2013375 (2014)","journal-title":"JIP"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:39:29Z","timestamp":1559356769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}