{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T10:26:29Z","timestamp":1672482389328},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,1,29]],"date-time":"2011-01-29T00:00:00Z","timestamp":1296259200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s00145-010-9096-4","type":"journal-article","created":{"date-parts":[[2011,1,28]],"date-time":"2011-01-28T17:24:52Z","timestamp":1296235492000},"page":"310-348","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Verifier Signatures"],"prefix":"10.1007","volume":"25","author":[{"given":"Tom","family":"Roeder","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Pass","sequence":"additional","affiliation":[]},{"given":"Fred B.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,29]]},"reference":[{"key":"9096_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-87779-0_2","volume-title":"Proc. 22nd International Symposium on Distributed Computing","author":"A.S. Aiyer","year":"2008","unstructured":"A.S. Aiyer, L. Alvisi, R.A. Bazzi, A. Clement, Matrix signatures: From MACs to digital signatures in distributed systems, in Proc. 22nd International Symposium on Distributed Computing. Lecture Notes in Computer Science, vol. 5218 (Springer, Berlin, 2008), pp. 16\u201331"},{"key":"9096_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology\u2014CRYPTO\u201994, Proc. 14th Annual International Cryptology Conference","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, The security of cipher block chaining, in Advances in Cryptology\u2014CRYPTO\u201994, Proc. 14th Annual International Cryptology Conference, ed. by Y. Desmedt. Lecture Notes in Computer Science, vol. 839 (Springer, Berlin, 1994), pp. 341\u2013358"},{"key":"9096_CR3","unstructured":"M. Bellare, O. Goldreich, A. Mityagin, The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive, 2004. Report 2004\/309, 2004"},{"key":"9096_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/3-540-44987-6_27","volume-title":"Advances in Cryptology\u2014Eurocrypt\u201901, Proc. International Conference on the Theory and Applications of Cryptographic Techniques","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, G. Durfee, M. Franklin, Lower bounds for multicast message authentication, in Advances in Cryptology\u2014Eurocrypt\u201901, Proc. International Conference on the Theory and Applications of Cryptographic Techniques, ed. by B. Pfitzmann. Lecture Notes in Computer Science, vol. 2045 (Springer, Berlin, 2001), pp. 437\u2013452"},{"issue":"4","key":"9096_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing. J. Cryptol.\n                           17(4), 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"9096_CR6","first-page":"706","volume-title":"IEEE INFOCOM\u201999. Proc. 18th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas. Multicast security: A taxonomy and some efficient constructions, in IEEE INFOCOM\u201999. Proc. 18th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2 (IEEE Computer Society, Los Alamitos, 1999), pp. 706\u2013716"},{"key":"9096_CR7","unstructured":"M. Castro, B. Liskov, Practical Byzantine fault tolerance, in Proc. 3rd Symposium on Operating Systems Design and Implementation, Berkeley, CA, February 1999. USENIX Association, Co-sponsored by IEEE TOCS and ACM SIGOPS, pp.\u00a0173\u2013186"},{"issue":"2","key":"9096_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/0012-365X(90)90322-9","volume":"82","author":"L.S. Charlap","year":"1990","unstructured":"L.S. Charlap, H.D. Rees, D.P. Robbins, The asymptotic probability that a random biased matrix is invertible. Discrete Math.\n                           82(2), 153\u2013163 (1990)","journal-title":"Discrete Math."},{"key":"9096_CR9","series-title":"Lecture Notes in Computer Science","first-page":"206","volume-title":"Advances in Cryptology\u2014CRYPTO\u201990, Proc. 10th Annual Cryptology Conference","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, S. Roijakkers, Unconditionally secure digital signatures, in Advances in Cryptology\u2014CRYPTO\u201990, Proc. 10th Annual Cryptology Conference, ed. by A. Menezes, S.A. Vanstone. Lecture Notes in Computer Science, vol. 537 (Springer, Berlin, 1990), pp. 206\u2013214"},{"key":"9096_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology\u2014CRYPTO\u201998, Proc. 18th Annual International Cryptology Conference","author":"R. Cramer","year":"1998","unstructured":"R. Cramer, V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in Advances in Cryptology\u2014CRYPTO\u201998, Proc. 18th Annual International Cryptology Conference, ed. by H. Krawczyk. Lecture Notes in Computer Science, vol. 1462 (Springer, Berlin, 1998), pp. 13\u201325"},{"key":"9096_CR11","first-page":"2045","volume-title":"IEEE INFOCOM\u201992: Proc. 11th Annual Joint Conference of the IEEE Computer and Communications Societies on One World through Communications","author":"Y. Desmedt","year":"1992","unstructured":"Y. Desmedt, Y. Frankel, M. Yung. Multi-receiver\/multi-sender network security: efficient authenticated multicast\/feedback, in IEEE INFOCOM\u201992: Proc. 11th Annual Joint Conference of the IEEE Computer and Communications Societies on One World through Communications (IEEE Computer Society, Los Alamitos, 1992), pp. 2045\u20132054"},{"issue":"6","key":"9096_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory\n                           IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"9096_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0196-6774(82)90004-9","volume":"3","author":"D. Dolev","year":"1982","unstructured":"D. Dolev, The Byzantine Generals strike again. J. Algorithms\n                           3(1), 14\u201330 (1982)","journal-title":"J. Algorithms"},{"key":"9096_CR14","volume-title":"Reasoning about Knowledge","author":"R. Fagin","year":"2003","unstructured":"R. Fagin, J.Y. Halpern, Y. Moses, M.Y. Vardi, Reasoning about Knowledge (MIT Press, Cambridge, 2003)"},{"key":"9096_CR15","first-page":"416","volume-title":"STOC\u201990: Proc. 22nd Annual ACM Symposium on Theory of Computing","author":"U. Feige","year":"1990","unstructured":"U. Feige, A. Shamir, Witness indistinguishable and witness hiding protocols, in STOC\u201990: Proc. 22nd Annual ACM Symposium on Theory of Computing, ed. by H. Ortiz (ACM, New York, 1990), pp. 416\u2013426"},{"key":"9096_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2001","unstructured":"O. Goldreich, Foundations of Cryptography, vol.\u00a0I (Cambridge University Press, Cambridge, 2001)"},{"issue":"2","key":"9096_CR17","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.\n                           17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"9096_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/3-540-44448-3_11","volume-title":"Advances in Cryptology\u2014Asiacrypt\u201900, Proc. 6th International Conference on the Theory and Application of Cryptology and Information Security","author":"G. Hanaoka","year":"2000","unstructured":"G. Hanaoka, J. Shikata, Y. Zheng, H. Imai, Unconditionally secure digital signature schemes admitting transferability, in Advances in Cryptology\u2014Asiacrypt\u201900, Proc. 6th International Conference on the Theory and Application of Cryptology and Information Security, ed. by T. Okamoto. Lecture Notes in Computer Science, vol. 1976 (Springer, Berlin, 2000), pp. 130\u2013142"},{"issue":"1\u20132","key":"9096_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1006\/inco.1998.2767","volume":"151","author":"T. Johansson","year":"1999","unstructured":"T. Johansson, Further results on asymmetric authentication schemes. Inf. Comput.\n                           151(1\u20132), 100\u2013133 (1999)","journal-title":"Inf. Comput."},{"key":"9096_CR20","unstructured":"L. Lamport, Personal communication"},{"issue":"1","key":"9096_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TDSC.2004.3","volume":"1","author":"M. Marsh","year":"2004","unstructured":"M. Marsh, F.B. Schneider, CODEX: A robust and secure secret distribution system. IEEE Trans. Dependable Secure Comput.\n                           1(1), 34\u201347 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9096_CR22","first-page":"33","volume-title":"STOC\u201989: Proc. 21st Annual ACM Symposium on Theory of Computing","author":"M. Naor","year":"1989","unstructured":"M. Naor, M. Yung, Universal one-way hash functions and their cryptographic applications, in STOC\u201989: Proc. 21st Annual ACM Symposium on Theory of Computing (ACM, New York, 1989), pp. 33\u201343"},{"key":"9096_CR23","unstructured":"OpenSSL Project, Available at \n                    http:\/\/www.openssl.org"},{"key":"9096_CR24","series-title":"Lecture Notes in Computer Science","first-page":"339","volume-title":"Proc. 9th Annual Symposium on Theoretical Aspects of Computer Science","author":"B. Pfitzmann","year":"1992","unstructured":"B. Pfitzmann, M. Waidner, Unconditional Byzantine agreement for any number of faulty processors, in Proc. 9th Annual Symposium on Theoretical Aspects of Computer Science, ed. by A. Finkel, M. Jantzen. Lecture Notes in Computer Science, vol. 577 (Springer, Berlin, 1992), pp. 339\u2013350"},{"issue":"2","key":"9096_CR25","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, L. Adelman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\n                           21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"9096_CR26","first-page":"387","volume-title":"STOC\u201990: Proc. 22nd Annual ACM Symposium on Theory of Computing","author":"J. Rompel","year":"1990","unstructured":"J. Rompel, One-way functions are necessary and sufficient for secure signatures, in STOC\u201990: Proc. 22nd Annual ACM Symposium on Theory of Computing (ACM, New York, 1990), pp. 387\u2013394."},{"key":"9096_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-540-24632-9_17","volume-title":"Public Key Cryptography\u2014PKC 2004, Proc. 7th International Workshop on Theory and Practice in Public Key Cryptography","author":"R. Safavi-Naini","year":"2004","unstructured":"R. Safavi-Naini, L. McAven, M. Yung, General group authentication codes and their relation to \u201cUnconditionally-secure signatures\u201d, in Public Key Cryptography\u2014PKC 2004, Proc. 7th International Workshop on Theory and Practice in Public Key Cryptography, ed. by F. Bao, R.H. Deng, J. Zhou. Lecture Notes in Computer Science, vol. 2947 (Springer, Berlin, 2004), pp. 231\u2013247"},{"key":"9096_CR28","unstructured":"FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington, DC, April 1995"},{"key":"9096_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/3-540-46035-7_29","volume-title":"Advances in Cryptology\u2014Eurocrypt\u201902, Proc. 21st International Conference on the Theory and Applications of Cryptographic Techniques","author":"J. Shikata","year":"2002","unstructured":"J. Shikata, G. Hanaoka, Y. Zheng, H. Imai, Security notions for unconditionally secure signature schemes, in Advances in Cryptology\u2014Eurocrypt\u201902, Proc. 21st International Conference on the Theory and Applications of Cryptographic Techniques, ed. by L.R. Knudsen. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 434\u2013449"},{"issue":"4","key":"9096_CR30","first-page":"329","volume":"20","author":"L. Zhou","year":"2002","unstructured":"L. Zhou, F.B. Schneider, R. van Renesse, COCA: A secure distributed online certification authority. ACM T. Comput. Syst.\n                           20(4), 329\u2013368 (2002)","journal-title":"Comput. Syst."}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9096-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9096-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9096-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9096-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:49:45Z","timestamp":1586335785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-010-9096-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,29]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["9096"],"URL":"https:\/\/doi.org\/10.1007\/s00145-010-9096-4","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,29]]},"assertion":[{"value":"15 August 2009","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2011","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}