{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:41Z","timestamp":1772283641995,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,7,3]],"date-time":"2009-07-03T00:00:00Z","timestamp":1246579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1007\/s10623-009-9313-z","type":"journal-article","created":{"date-parts":[[2009,7,2]],"date-time":"2009-07-02T14:30:15Z","timestamp":1246545015000},"page":"121-133","source":"Crossref","is-referenced-by-count":47,"title":["Efficient discrete logarithm based multi-signature scheme in the plain public key model"],"prefix":"10.1007","volume":"54","author":[{"given":"Changshe","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,3]]},"reference":[{"key":"9313_CR1","unstructured":"Avanzi R.: On multi-exponentiation in cryptography. Cryptology ePrint Archive: Report 2002\/154 (2002)."},{"key":"9313_CR2","doi-asserted-by":"crossref","unstructured":"Bagherzandi A., Cheon J.H., Jarecki S.: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. In: The 15th ACM Conference on Computer and Communication Security (2008).","DOI":"10.1145\/1455770.1455827"},{"key":"9313_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M., Neven G.: Multi-signature in the plain public-key model and a genral forking lemma. In: The 13th ACM Conference on Computer and Communication Security (2006).","DOI":"10.1145\/1180405.1180453"},{"key":"9313_CR4","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P.: Random oracles are practical: a paradigm for designing efficient protocols. In: The 1st ACM Conference on Computer and Communications Security (1993).","DOI":"10.1145\/168588.168596"},{"key":"9313_CR5","unstructured":"Boldyreva A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Difiie-Hellman-group signature schemes. In: Public Key Cryptography 2003. Lecture Notes in Computer Science, vol. 1567 (2003)."},{"key":"9313_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D., Lynn B., Shacham H.: Short signatures from the Weil pairing. In: Advances in Cryptology-ASIACRYPT 2001. Lecture Notes in Computer Science, vol. 2248 (2001).","DOI":"10.1007\/3-540-45682-1_30"},{"key":"9313_CR7","doi-asserted-by":"crossref","unstructured":"Feige U., Shamir A.: Witness indistinguishable and witness hiding protocols. In: The 22nd Annual ACM Symposium on Theory of Computing (1990).","DOI":"10.1145\/100216.100272"},{"key":"9313_CR8","unstructured":"Fiat A., Shamir A.: How to prove yourself: practical solutions to identification and signature problems. In: Advances in Cryptology-CRYPTO 1986. Lecture Notes in Computer Science, vol. 263 (1986)."},{"issue":"2","key":"9313_CR9","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser S., Micali S., Rivest R.: A digital signature scheme secure against adaptive chosen message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"9313_CR10","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"Harn L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Comput. Digit. Tech. 141(5), 307\u2013313 (1994)","journal-title":"IEE Proc. Comput. Digit. Tech."},{"key":"9313_CR11","doi-asserted-by":"crossref","unstructured":"Housley R., Ford M., Polk W., Solo D.: Internet X.509 Public Key Infrastructure: certificate and CRL profile, http:\/\/www.ietf.org\/rfc\/rfc2459.txt . Accessed January 1999.","DOI":"10.17487\/rfc2459"},{"key":"9313_CR12","doi-asserted-by":"crossref","unstructured":"Horster P., Michels M., Petersen H.: Meta-multisignatures schemes based on the discrete logarithm problem. In: IFIP\/SEC, Chapman & Hall (1995).","DOI":"10.1007\/978-0-387-34873-5_11"},{"key":"9313_CR13","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"Itakura K., Nakamura K.: A public-key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71, 1\u20138 (1983)","journal-title":"NEC Res. Dev."},{"key":"9313_CR14","doi-asserted-by":"crossref","unstructured":"Katz J., Wang N.: Efficiency improvements for signature schemes with tight security reductions. In: The 10th ACM Conference on Computer and Communications Security (2003).","DOI":"10.1145\/948109.948132"},{"key":"9313_CR15","doi-asserted-by":"crossref","unstructured":"Langford S.K.: Weakness in some threshold cryptosystems. In: Advances in Cryptology-CRYPTO 1996. Lecture Notes in Computer Science, vol. 1109 (1996).","DOI":"10.1007\/3-540-68697-5_6"},{"key":"9313_CR16","doi-asserted-by":"crossref","unstructured":"Li C.-M., Hwang T., Lee N.-Y.: Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Advances in Cryptology-EUROCRYPT 1994. Lecture Notes in Computer Science, vol. 950 (1994).","DOI":"10.1007\/BFb0053435"},{"key":"9313_CR17","doi-asserted-by":"crossref","unstructured":"Lu S., Ostrovsky R., Sahai A., Shacham H., Waters B.: Sequential aggregate signatures and multisignatures without random oracles. In: Advances in Cryptology-EUROCRYPT 2006. Lecture Notes in Computer Science, vol. 4004 (2006).","DOI":"10.1007\/11761679_28"},{"key":"9313_CR18","doi-asserted-by":"crossref","unstructured":"Micali S., Ohta K., Reyzin L.: Accountable-subgroup multisignatures. In: The 8th ACM Conference on Computer and Communications Security (2001).","DOI":"10.1145\/501983.502017"},{"key":"9313_CR19","doi-asserted-by":"crossref","unstructured":"Michels M., Horster P.: On the risk of disruption in several multiparty signature schemes. In: Advances in Cryptology-ASIACRYPT 1996. Lecture Notes in Computer Science, vol. 1163 (1996).","DOI":"10.1007\/BFb0034859"},{"key":"9313_CR20","doi-asserted-by":"crossref","unstructured":"Moller B.: Algorithms for multi-exponentiation. In: Selected Areas in Cryptography - SAC 2001. Lecture Notes in Computer Science, vol. 2259 (2001).","DOI":"10.1007\/3-540-45537-X_13"},{"key":"9313_CR21","unstructured":"Ohta K., Okamoto T.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACRYPT 1991. Lecture Notes in Computer Science, vol. 739 (1991)."},{"issue":"1","key":"9313_CR22","first-page":"21","volume":"E82-A","author":"K. Ohta","year":"1999","unstructured":"Ohta K., Okamoto T.: Multi-signature schemes secure against active insider attacks. IEICE Trans. Fundam. Electr. Commun. Comput. Sci. E82-A(1), 21\u201331 (1999)","journal-title":"IEICE Trans. Fundam. Electr. Commun. Comput. Sci."},{"key":"9313_CR23","unstructured":"Okamoto T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology-CRYPTO 1992. Lecture Notes in Computer Science, vol. 740 (1992)."},{"key":"9313_CR24","doi-asserted-by":"crossref","unstructured":"Ong H., Schnorr C.-P.: Fast signature generation with a Fiat Shamir-like scheme. In: Advances in Cryptology-EUROCRYPT 1990. Lecture Notes in Computer Science, vol. 473 (1990).","DOI":"10.1007\/3-540-46877-3_38"},{"issue":"3","key":"9313_CR25","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"9313_CR26","doi-asserted-by":"crossref","unstructured":"Ristenpart T., Yilek S.: The power of proofs of possession: Securing multiparty signatures against rogue-key attacks. In: Advances in Cryptology-EUROCRYPT 2007. Lecture Notes in Computer Science, vol. 4515 (2007).","DOI":"10.1007\/978-3-540-72540-4_13"},{"key":"9313_CR27","doi-asserted-by":"crossref","unstructured":"Schaad J.: Internet X.509 Public Key Infrastructure Certificate Request Message Format. Internet Engineering Task Force RFC 4211 (2005).","DOI":"10.17487\/rfc4211"},{"issue":"3","key":"9313_CR28","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.-P. Schnorr","year":"1991","unstructured":"Schnorr C.-P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9313-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9313-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9313-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T05:51:49Z","timestamp":1589953909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9313-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,3]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["9313"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9313-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,3]]}}}