{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:48Z","timestamp":1725514368307},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_10","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T05:27:19Z","timestamp":1181021239000},"page":"105-115","source":"Crossref","is-referenced-by-count":2,"title":["On the Sequentiality of Three Optimal Structured Multisignature Schemes"],"prefix":"10.1007","author":[{"given":"Zuhua","family":"Shao","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research and Development\u00a071, 1\u20138 (1983)","journal-title":"NEC Research and Development"},{"issue":"5","key":"10_CR2","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech.\u00a0141(5), 307\u2013313 (1994)","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","first-page":"139","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T., Ohta, K.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 139\u2013148. Springer, Heidelberg (1993)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0164-1212(00)00074-1","volume":"55","author":"K.R.P.H. Leung","year":"2001","unstructured":"Leung, K.R.P.H., Hui, L.C.K.: Handling signature purposes in workflow systems. The Journal of System and Software\u00a055, 245\u2013259 (2001)","journal-title":"The Journal of System and Software"},{"key":"10_CR5","series-title":"IFIP Conference Proceedings","first-page":"45","volume-title":"Advances in Network and distributed Systems security","author":"C.-Y. Lin","year":"2001","unstructured":"Lin, C.-Y., Wu, T.-C., Hwang, J.-j.: ID-based structured Multisignature Schemes. In: Advances in Network and distributed Systems security. IFIP Conference Proceedings, vol.\u00a0206, pp. 45\u201359. Kluwer Academic Publishers, Boston (2001)"},{"key":"10_CR6","series-title":"IFIP Conference Proceedings","first-page":"1","volume-title":"Proceedings of the IFIP TC6\/TC11 SixthJoint Working Conference on Communications and Multimedia Security (CMS)","author":"C.J. Mitchell","year":"2002","unstructured":"Mitchell, C.J., Hur, N.: On the security of a structural proven signer ordering multisignature scheme. In: Proceedings of the IFIP TC6\/TC11 SixthJoint Working Conference on Communications and Multimedia Security (CMS). IFIP Conference Proceedings, vol.\u00a0228, pp. 1\u20138. Kluwer Academic Publishers, Boston (2002)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/10718964_25","volume-title":"Information Security and Privacy","author":"S. Mitomi","year":"2000","unstructured":"Mitomi, S., Miyaji, A.: A Mulitisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 298\u2013312. Springer, Heidelberg (2000)"},{"key":"10_CR8","unstructured":"Tada, M.: An order-specified one-cycle multisignature scheme secure against active attack. In: Proceedings of computer security Symposium (CSS 2001), pp. 217\u2013222 (2001)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/978-3-540-46588-1_31","volume-title":"Public Key Cryptography","author":"M. Burmester","year":"2000","unstructured":"Burmester, M., et al.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 466\u2013482. Springer, Heidelberg (2000)"},{"key":"10_CR10","unstructured":"Wu, T.C., Hsu, C.L., Lin, C.Y.: On the security of Burmester et al. Structured ElGamal-Type Multisignature Scheme. In: Proceeding of 11th Conf. On National Security, Tianan, Taiwan, 3-4 May 2001, pp. 349\u2013352 (2001)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmelt","year":"1988","unstructured":"Desmelt, Y.: Society and group oriented cryptography: A new concept, Advances in Cryptology. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 120\u2013127. Springer, Heidelberg (1988)"},{"key":"10_CR12","unstructured":"Lin, C.-Y., Wu, T.-C., Zhang, F.: A structured multisignature scheme from the Gap Diffie-Hellman Group. eprint.iacr.org\/2003\/090 (2003)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"issue":"3","key":"10_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1049\/ip-cdt:20040247","volume":"151","author":"L. Harn","year":"2004","unstructured":"Harn, L., Lin, C.-y., Wu, T.-C.: Structured multisignature algorithms. IEE Proc-comput. Digit. Tech.\u00a0151(3), 231\u2013234 (2004)","journal-title":"IEE Proc-comput. Digit. Tech."},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"10_CR18","unstructured":"Dong, Z., Chen, K.: An attack on a multisignature scheme. eprint.iacr.org\/2003\/201 (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:05:07Z","timestamp":1619503507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_10","relation":{},"subject":[]}}