{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:18:31Z","timestamp":1761707911510},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540601760"},{"type":"electronic","value":"9783540447177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0053435","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T00:05:50Z","timestamp":1149638750000},"page":"194-204","source":"Crossref","is-referenced-by-count":45,"title":["Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders"],"prefix":"10.1007","author":[{"given":"Chuan-Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Narn-Yih","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel: \u201dShared Generation of Authenticators and Signatures\u201d, Advances in Cryptology \u2014 Crypto '91, Proceedings, pp.457\u2013469, Springer Verlag, 1991.","DOI":"10.1007\/3-540-46766-1_37"},{"key":"17_CR2","first-page":"61","volume-title":"(t,n) Threshold Signature and Digital Multisignature","author":"L. Harn","year":"1993","unstructured":"L. Harn: \u201d(t,n) Threshold Signature and Digital Multisignature\u201d, Workshop on Cryptography & Data Security, Proceedings, pp.61\u201373, June 7\u20139, Chung Cheng Institute of Technology, R.O.C., 1993."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: \u201dHow to Share A Secret\u201d, Commun. ACM, 22:612\u2013613, 1979.","journal-title":"Commun. ACM"},{"key":"17_CR4","unstructured":"C. Li, T. Hwang and N. Lee: \u201dRemark on the Threshold RSA Signature Scheme\u201d, Advances in Cryptology \u2014 Crypto '93, Proceedings, 1993."},{"key":"17_CR5","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"K. Itakura and K. Nakamura: \u201dA Public-Key Cryptosystem Suitable for Digital Multisignatures\u201d, NEC Research and Develop., 71, pp.1\u20138, 1983.","journal-title":"NEC Research and Develop."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"\u201dThe Digital Signature Standard\u201d, Commun. ACM, 35, No.7, pp.36\u201340, 1992.","DOI":"10.1145\/129902.129904"},{"issue":"12","key":"17_CR7","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1049\/el:19930747","volume":"29","author":"S. M. Yen","year":"1993","unstructured":"S. M. Yen and C. S. Laih: \u201dNew Digital Signature Scheme Based on Discrete Logarithm\u201d, Electrionics Letters, Vol. 29, (12), pp.1120\u20131121, 1993.","journal-title":"Electrionics Letters"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"T. Hardjono and Y. Zheng: \u201dA Practical Digital Multisignature Scheme Based on Discrete Logarithms\u201d, Advances in Cryptology \u2014 AUSCRYPTO'92, pp. 16\u201321, 1992.","DOI":"10.1007\/3-540-57220-1_56"},{"issue":"No.15","key":"17_CR9","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/el:19890670","volume":"25","author":"L. Harn","year":"1989","unstructured":"L. Harn and T. Kiesler: \u201dNew Scheme for Digital Multisignatures\u201d, Electronic Letters, Vol. 25, No. 15, pp. 1002\u20131003, 1989.","journal-title":"Electronic Letters"},{"key":"17_CR10","unstructured":"K. Ohta and T. Okamoto: \u201dA Digital Multisignature Scheme Based on the Fiat-Shamir Scheme\u201d, Advances in Cryptoloy \u2014 ASIACRYPT'91, pp. 75\u201379, 1991."},{"issue":"No.8","key":"17_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"T. Okamoto: \u201dA Digital Multisignature Scheme Using Bijective Public-Key Cryptosystem\u201d, ACM Transactions on Computer Systems, Vol. 6, No. 8, pp. 432\u2013441, 1988.","journal-title":"ACM Transactions on Computer Systems"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Y. Zheng, T. Matsumoto and H. Imai: \u201dStructural Properties of One \u2014 Way Hash Functions\u201d, Advances in Cryptology \u2014 Crypto '90, Proceedings, pp. 285\u2013302, Springer Verlag, 1990.","DOI":"10.1007\/3-540-38424-3_21"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T02:21:57Z","timestamp":1555640517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053435"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540601760","9783540447177"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0053435","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}