{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:01:50Z","timestamp":1725721310295},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642376818"},{"type":"electronic","value":"9783642376825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37682-5_30","type":"book-chapter","created":{"date-parts":[[2013,4,2]],"date-time":"2013-04-02T21:48:15Z","timestamp":1364939295000},"page":"425-440","source":"Crossref","is-referenced-by-count":6,"title":["Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures"],"prefix":"10.1007","author":[{"given":"Keisuke","family":"Hakuta","sequence":"first","affiliation":[]},{"given":"Yosuke","family":"Katoh","sequence":"additional","affiliation":[]},{"given":"Hisayoshi","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/11693383_21","volume-title":"Selected Areas in Cryptography","author":"A. Antipa","year":"2006","unstructured":"Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated Verification of ECDSA Signatures. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 307\u2013318. Springer, Heidelberg (2006)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"E.F. Brickell","year":"1993","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast Exponentiation with Precomputation. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 200\u2013207. Springer, Heidelberg (1993)"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast Batch Verification for Modular Exponentiation and Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 236\u2013250. Springer, Heidelberg (1998), http:\/\/www-cse.ucsd.edu\/users\/mihir"},{"key":"30_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-44448-3_5","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"C. Boyd","year":"2000","unstructured":"Boyd, C., Pavlovski, C.: Attacking and Repairing Batch Verification Schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 58\u201371. Springer, Heidelberg (2000)"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-72540-4_14","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"J. Camenisch","year":"2007","unstructured":"Camenisch, J., Hohenberger, S., Pedersen, M.\u00d8.: Batch Verification of Short Signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 246\u2013263. Springer, Heidelberg (2007)"},{"issue":"12","key":"30_CR6","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/TC.2006.207","volume":"55","author":"J.H. Cheon","year":"2006","unstructured":"Cheon, J.H., Lee, D.H.: Use of Sparse and\/or Complex Exponents in Batch Verification of Exponentiations. IEEE Transactions on Computers\u00a055(12), 1536\u20131542 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-49162-7_15","volume-title":"Public Key Cryptography","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S., Naccache, D.: On the Security of RSA Screening. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 197\u2013203. Springer, Heidelberg (1999)"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-540-71677-8_29","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"J.H. Cheon","year":"2007","unstructured":"Cheon, J.H., Yi, J.H.: Fast Batch Verification of Multiple Signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 442\u2013457. Springer, Heidelberg (2007)"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-89598-5_4","volume-title":"Advances in Information and Computer Security","author":"F. Guo","year":"2008","unstructured":"Guo, F., Mu, Y., Chen, Z.: Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. In: Matsuura, K., Fujisaki, E. (eds.) IWSEC 2008. LNCS, vol.\u00a05312, pp. 49\u201363. Springer, Heidelberg (2008)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R.P. Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"issue":"9","key":"30_CR11","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1049\/el:19980620","volume":"34","author":"L. Harn","year":"1998","unstructured":"Harn, L.: Batch Verifying Multiple DSA Digital Signatures. Electronics Letters\u00a034(9), 870\u2013871 (1998)","journal-title":"Electronics Letters"},{"issue":"12","key":"30_CR12","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1049\/el:19980833","volume":"34","author":"L. Harn","year":"1998","unstructured":"Harn, L.: Batch Verifying Multiple RSA Digital Signatures. Electronics Letters\u00a034(12), 1219\u20131220 (1998)","journal-title":"Electronics Letters"},{"key":"30_CR13","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"issue":"1","key":"30_CR14","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1112\/S1461157000000747","volume":"5","author":"K. Harrison","year":"2002","unstructured":"Harrison, K., Page, D., Smart, N.P.: Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems. LMS Journal of Computation and Mathematics\u00a05(1), 181\u2013193 (2002)","journal-title":"LMS Journal of Computation and Mathematics"},{"issue":"3","key":"30_CR15","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3923\/jas.2001.287.288","volume":"1","author":"M.S. Hwang","year":"2001","unstructured":"Hwang, M.S., Lee, C.C., Lu, E.J.: Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signatures. Pakistan Journal of Applied Sciences\u00a01(3), 287\u2013288 (2001)","journal-title":"Pakistan Journal of Applied Sciences"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Hakuta, K., Katoh, Y., Sato, H., Takagi, T.: Batch Verification Suitable for Efficiently Verifying A Limited Number of Signatures. In: Preproceedings of the 15th Annual International Conference on Information Security and Cryptology, ICISC 2012 (2012)","DOI":"10.1007\/978-3-642-37682-5_30"},{"issue":"3","key":"30_CR17","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1515\/jmc.2010.009","volume":"4","author":"K. Hakuta","year":"2010","unstructured":"Hakuta, K., Sato, H., Takagi, T.: Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. J. Math. Cryptol.\u00a04(3), 199\u2013238 (2010)","journal-title":"J. Math. Cryptol."},{"key":"30_CR18","first-page":"75","volume":"2A","author":"K. Hakuta","year":"2010","unstructured":"Hakuta, K., Sato, H., Takagi, T.: Explicit lower bound for the length of minimal weight \u03c4-adic expansions on Koblitz curves. J. Math-for-Ind.\u00a02A, 75\u201383 (2010)","journal-title":"J. Math-for-Ind."},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/BFb0055739","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"N. Koblitz","year":"1998","unstructured":"Koblitz, N.: An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 327\u2013337. Springer, Heidelberg (1998)"},{"key":"30_CR20","unstructured":"National Institute for Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3 (June 2009), http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf"},{"issue":"1","key":"30_CR21","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1093\/ietfec\/e89-a.1.74","volume":"89","author":"S. Lee","year":"2006","unstructured":"Lee, S., Cho, S., Choi, J., Cho, J.: Efficient Identification of Bad Signatures in RSA-Type Batch Signatures. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E89-A(1), 74\u201380 (2006)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"30_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BFb0053426","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"D. Naccache","year":"1995","unstructured":"Naccache, D., M\u2019Ra\u00efhi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A be Improved? Complexity trade-offs with the Digital Signature Standard. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 77\u201385. Springer, Heidelberg (1995)"},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-46588-1_3","volume-title":"Public Key Cryptography","author":"J. Pastuszak","year":"2000","unstructured":"Pastuszak, J., Micha\u0142ek, D., Pieprzyk, J., Seberry, J.: Identification of Bad Signatures in Batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 28\u201345. Springer, Heidelberg (2000)"},{"key":"30_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-36552-4_19","volume-title":"Information Security and Cryptology - ICISC 2002","author":"T.-J. Park","year":"2003","unstructured":"Park, T.-J., Lee, M.-K., Park, K.: New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 264\u2013282. Springer, Heidelberg (2003)"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. GTM, vol.\u00a0106. Springer (1986)","DOI":"10.1007\/978-1-4757-1920-8"},{"issue":"2","key":"30_CR26","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/PL00003820","volume":"12","author":"N.P. Smart","year":"1999","unstructured":"Smart, N.P.: Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. Journal of Cryptology\u00a012(2), 141\u2013151 (1999)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"30_CR27","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology\u00a04(3), 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"issue":"2-3","key":"30_CR28","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J.A. Solinas","year":"2000","unstructured":"Solinas, J.A.: Efficient Arithmetic on Koblitz Curves. Des. Codes Cryptogr.\u00a019(2-3), 195\u2013249 (2000)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"30_CR29","first-page":"238","volume":"6","author":"M. Stanek","year":"2008","unstructured":"Stanek, M.: Attacking LCCC Batch Verification of RSA Signatures. International Journal of Network Security\u00a06(2), 238\u2013240 (2008)","journal-title":"International Journal of Network Security"},{"key":"30_CR30","series-title":"SCI","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-13965-9_3","volume-title":"Wireless Sensor Network Technologies for the Information Explosion Era","author":"V. Kumar","year":"2010","unstructured":"Kumar, V., Madria, S.: Secure Data Aggregation in Wireless Sensor Networks. In: Hara, T., Zadorozhny, V.I., Buchmann, E. (eds.) Wireless Sensor Network Technologies for the Information Explosion Era. SCI, vol.\u00a0278, pp. 77\u2013107. Springer, Heidelberg (2010)"},{"issue":"7","key":"30_CR31","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/12.392857","volume":"44","author":"S.M. Yen","year":"1995","unstructured":"Yen, S.M., Laih, C.S.: Improved Digital Signature Suitable for Batch Verification. IEEE Transactions on Computers\u00a044(7), 957\u2013959 (1995)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37682-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T13:50:47Z","timestamp":1562853047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37682-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642376818","9783642376825"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37682-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}