{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090661,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_4","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:22:53Z","timestamp":1749846173000},"page":"56-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tightly Secure Lattice-Based Synchronized Aggregate Signature in\u00a0Standard Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4472-0662","authenticated-orcid":false,"given":"Hiroaki","family":"Anada","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7471-4477","authenticated-orcid":false,"given":"Masayuki","family":"Fukumitsu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-5495","authenticated-orcid":false,"given":"Shingo","family":"Hasegawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"4_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-031-68376-3_3","volume-title":"Advances in Cryptology - CRYPTO 2024","author":"MA Aardal","year":"2024","unstructured":"Aardal, M.A., Aranha, D.F., Boudgoust, K., Kolby, S., Takahashi, A.: Aggregating falcon signatures with labrador. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology - CRYPTO 2024. LNCS, vol. 14920, pp. 71\u2013106. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68376-3_3"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Ahn, J.H., Green, M., Hohenberger, S.: Synchronized aggregate signatures: new definitions, constructions and applications. In: The 17th ACM Conference on Computer and Communications Security, CCS \u201910, pp. 473\u2013484. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1866307.1866360","DOI":"10.1145\/1866307.1866360"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS \u201906, pp. 390\u2013399. Association for Computing Machinery, New York (2006). https:\/\/doi.org\/10.1145\/1180405.1180453","DOI":"10.1145\/1180405.1180453"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS \u201993, pp. 62\u201373. Association for Computing Machinery, New York (1993). https:\/\/doi.org\/10.1145\/168588.168596","DOI":"10.1145\/168588.168596"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"key":"4_CR6","unstructured":"Boneh, D., Kim, S.: One-time and interactive aggregate signatures from lattices. preprint 4 (2020). https:\/\/crypto.stanford.edu\/~skim13\/agg_ots.pdf"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Boudgoust, K., Roux-Langlois, A.: Overfull: too large aggregate signatures based on lattices. Comput. J. bxad013 (2023). https:\/\/doi.org\/10.1093\/comjnl\/bxad013","DOI":"10.1093\/comjnl\/bxad013"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-031-50594-2_14","volume-title":"Computer Security - ESORICS 2023","author":"K Boudgoust","year":"2024","unstructured":"Boudgoust, K., Takahashi, A.: Sequential half-aggregation of lattice-based signatures. In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds.) Computer Security - ESORICS 2023, pp. 270\u2013289. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-50594-2_14"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557\u2013594 (2004). https:\/\/doi.org\/10.1145\/1008731.1008734","DOI":"10.1145\/1008731.1008734"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-36362-7_5","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"D Catalano","year":"2013","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55\u201372. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36362-7_5"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Fleischhacker, N., Herold, G., Simkin, M., Zhang, Z.: Chipmunk: better synchronized multi-signatures from lattices. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201923, pp. 386\u2013400. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3576915.3623219","DOI":"10.1145\/3576915.3623219"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Fleischhacker, N., Herold, G., Simkin, M., Zhang, Z.: Chipmunk: Better synchronized multi-signatures from lattices. Cryptology ePrint Archive, Paper 2023\/1820 (2023). 3576915.3623219. https:\/\/eprint.iacr.org\/2023\/1820","DOI":"10.1145\/3576915.3623219"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Fleischhacker, N., Simkin, M., Zhang, Z.: Squirrel: efficient synchronized multi-signatures from lattices. In: the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201922, pp. 1109\u20131123. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3548606.3560655","DOI":"10.1145\/3548606.3560655"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-40041-4_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"S Hohenberger","year":"2013","unstructured":"Hohenberger, S., Sahai, A., Waters, B.: Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 494\u2013512. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_27"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-78375-8_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"S Hohenberger","year":"2018","unstructured":"Hohenberger, S., Waters, B.: Synchronized aggregate signatures from the RSA assumption. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 197\u2013229. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_7"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Kim, H., Lee, Y., Abdalla, M., Park, J.H.: Practical dynamic group signature with efficient concurrent joins and batch verifications. J. Inf. Secur. Appl. 63, 103003 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.103003. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212621002106","DOI":"10.1016\/j.jisa.2021.103003"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-39884-1_14","volume-title":"Financial Cryptography and Data Security","author":"K Lee","year":"2013","unstructured":"Lee, K., Lee, D.H., Yung, M.: Aggregating CL-signatures revisited: extended functionality and better efficiency. In: Sadeghi, A.R. (ed.) Financial Cryptography and Data Security, pp. 171\u2013188. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_14"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1007\/s00145-017-9270-z","volume":"31","author":"V Lyubashevsky","year":"2018","unstructured":"Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31(3), 774\u2013797 (2018). https:\/\/doi.org\/10.1007\/s00145-017-9270-z","journal-title":"J. Cryptol."},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11967668_3","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"P Paillier","year":"2006","unstructured":"Paillier, P.: Impossibility proofs for RSA signatures in the standard model. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 31\u201348. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11967668_3"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11593447_1","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P Paillier","year":"2005","unstructured":"Paillier, P., Vergnaud, D.: Discrete-log-based signatures may not be equivalent to discrete log. In: Roy, B. (ed.) Advances in Cryptology - ASIACRYPT 2005, pp. 1\u201320. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_1"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-319-76953-0_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2018","author":"D Pointcheval","year":"2018","unstructured":"Pointcheval, D., Sanders, O.: Reassessing security of randomizable signatures. In: Smart, N.P. (ed.) CT-RSA 2018. LNCS, vol. 10808, pp. 319\u2013338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76953-0_17"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-030-99587-4_49","volume-title":"Advanced Information Networking and Applications","author":"S Sato","year":"2022","unstructured":"Sato, S., Shikata, J.: Quantum-secure aggregate one-time signatures with detecting functionality. In: Barolli, L., Hussain, F., Enokido, T. (eds.) Advanced Information Networking and Applications, pp. 573\u2013585. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99587-4_49"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-55304-3","volume-title":"Information Security and Privacy","author":"M Tezuka","year":"2020","unstructured":"Tezuka, M., Tanaka, K.: Improved security proof for the camenisch-lysyanskaya signature-based synchronized aggregate signature scheme. In: Liu, J.K., Cui, H. (eds.) Information Security and Privacy, pp. 225\u2013243. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55304-3"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-031-29371-9_16","volume-title":"Information Security and Cryptology - ICISC 2022","author":"M Tezuka","year":"2023","unstructured":"Tezuka, M., Tanaka, K.: Pointcheval-sanders signature-based synchronized aggregate signature. In: Seo, S.H., Seo, H. (eds.) Information Security and Cryptology - ICISC 2022, pp. 317\u2013336. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-29371-9_16"},{"key":"4_CR26","unstructured":"Tomita, T., Shikata, J.: Compact signature aggregation from module-lattices. Cryptology ePrint Archive, Paper 2023\/471 (2023). https:\/\/eprint.iacr.org\/2023\/471"},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-031-15979-4_15","volume-title":"CRYPTO 2022","author":"B Waters","year":"2022","unstructured":"Waters, B., Wu, D.J.: Batch arguments for NP and more from standard bilinear group assumptions. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, pp. 433\u2013463. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15979-4_15"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:22:56Z","timestamp":1749846176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}