{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:09:32Z","timestamp":1743131372940,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_7","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"79-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Identity-Based Multivariate Signature Scheme"],"prefix":"10.1007","author":[{"given":"Satyam","family":"Omar","sequence":"first","affiliation":[]},{"given":"Sahadeo","family":"Padhye","sequence":"additional","affiliation":[]},{"given":"Dhananjoy","family":"Dey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Eisenbarth T, Rupp A, Wolf C (2008) Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves? CHES 2008, LNCS, vol 5154. Springer, pp 45\u201361","DOI":"10.1007\/978-3-540-85053-3_4"},{"key":"#cr-split#-7_CR2.1","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: J Kilian","DOI":"10.1007\/3-540-44647-8_13"},{"key":"#cr-split#-7_CR2.2","unstructured":"(ed) Advances in cryptology CRYPTO 2001. CRYPTO 2001. LNCS, vol 2139. Springer, Berlin, Heidelberg, pp 213-229"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Chen AIT, Chen MS, Chen TR, Cheng CM, Ding J, Kuo EL, Lee FY, Yang BY (2009) SSE implementation of multivariate PKCs on modern x86cpus. CHES 2009, LNCS, vol 5747. Springer, pp 33\u201348","DOI":"10.1007\/978-3-642-04138-9_3"},{"key":"7_CR4","unstructured":"Courtois NT, Goubin L, Patarin J (2003) SFLASHv3, a fast asymmetric signature scheme. IACR Cryptology ePrint archive, report 2003\/211. Citeseer"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Chen MS, Hlsing A, Rijneveld J, Samardjiska S, Schwabe P (2016) From 5-pass MQ-based identification to MQ-based signatures. In: Advances in cryptology\u2014ASIACRYPT 2016\u201422nd international conference on the theory and application of cryptology and information security. LNCS, vol 10032. Springer, pp 135\u2013165","DOI":"10.1007\/978-3-662-53890-6_5"},{"key":"#cr-split#-7_CR6.1","doi-asserted-by":"crossref","unstructured":"Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Honary B","DOI":"10.1007\/3-540-45325-3_32"},{"key":"#cr-split#-7_CR6.2","unstructured":"(ed) Cryptography and coding. Cryptography and coding 2001. LNCS, vol 2260. Springer, Berlin, Heidelberg, pp 360-363"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Ding J, Schmidt DS (2005) Rainbow, a new multivariate polynomial signature scheme. ACNS 2005, LNCS, vol 3531. Springer, pp 164\u2013175","DOI":"10.1007\/11496137_12"},{"key":"#cr-split#-7_CR8.1","unstructured":"Fiat A, Shamir A (1987) How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko AM"},{"key":"#cr-split#-7_CR8.2","unstructured":"(ed) Advances in cryptology CRYPTO 86. CRYPTO 1986. LNCS, vol 263. Springer, Berlin, Heidelberg, pp 186-194"},{"key":"#cr-split#-7_CR9.1","doi-asserted-by":"crossref","unstructured":"Fouque PA, Granboulan L, Stern J (2005) Differential cryptanalysis for multivariate schemes. In: Cramer R","DOI":"10.1007\/11426639_20"},{"key":"#cr-split#-7_CR9.2","unstructured":"(ed) Advances in cryptology EUROCRYPT 2005. EUROCRYPT 2005. LNCS, vol 3494. Springer, Berlin, Heidelberg, pp 341-353"},{"key":"7_CR10","unstructured":"Garey Michael R, Johnson David S (1991) Computers and intractability, a Guide to the theory of NP-completeness. W.H. Freeman"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich O (2001) Foundations of cryptography, vol. 1, Basic tools. Cambridge University Press","DOI":"10.1017\/CBO9780511546891"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kipnis A, Patarin L, Goubin L (1999) Unbalanced oil and vinegar schemes. EUROCRYPT 1999, LNCS, vol 1592. Springer, pp 206\u2013222","DOI":"10.1007\/3-540-48910-X_15"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Luyen LV (2019) An improved identity-based multivariate signature scheme based on rainbow. Cryptography 2019, vol 3. MDPI","DOI":"10.3390\/cryptography3010008"},{"key":"7_CR14","unstructured":"Patarin J (1997) The oil and vinegar signature scheme. In: Dagstuhl workshop on cryptography"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Petzoldt A, Chen MS, Yang BY, Tao C, Ding J (2015) Design Principles for HFEv-based Signature schemes. ASIACRYPT 2015\u2014Part 1, LNCS, vol 9452. Springer, pp 311\u2013334","DOI":"10.1007\/978-3-662-48797-6_14"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Shamir A (1985). Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology. CRYPTO 1984. LNCS, vol 196. Springer, Berlin, Heidelberg, pp 47\u201353","DOI":"10.1007\/3-540-39568-7_5"},{"key":"#cr-split#-7_CR17.1","doi-asserted-by":"crossref","unstructured":"Sakumoto K, Shirai T, Hiwatari H (2011) Public-key identification schemes based on multivariate quadratic polynomials. In: Rogaway P","DOI":"10.1007\/978-3-642-22792-9_40"},{"key":"#cr-split#-7_CR17.2","unstructured":"(ed) Advances in cryptology CRYPTO 2011. CRYPTO 2011, LNCS, vol 6841. Springer, Berlin, Heidelberg, pp 706-723"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Shor P (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484\u20131509","DOI":"10.1137\/S0097539795293172"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Shen W, Tang S, Xu L (2013) IBUOV, a provably secure identity-based UOV signature scheme. In: Proceedings of the 2013 IEEE 16th international conference on computational science and engineering, CSE 2013. Sydney, Australia, pp 388\u2013395. 35 Dec 2013","DOI":"10.1109\/CSE.2013.66"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Yang BY, Chen JM, Chen YH (2004) TTS: high-speed signatures on a low-cost smart card. In: Joye M, Quisquater JJ (eds) Cryptographic hardware and embedded systems\u2014CHES 2004. CHES 2004. Lecture notes in computer science, vol 3156. Springer, Berlin, Heidelberg, pp 371\u2013385","DOI":"10.1007\/978-3-540-28632-5_27"},{"key":"7_CR21","unstructured":"Zhang F, Liu S, Kim K (2002) ID-based one round authenticated tripartite key agreement protocol with pairings. Cryptology ePrint archive, report 2002\/122. Citeseer"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:03:47Z","timestamp":1646489027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}