{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T07:05:14Z","timestamp":1775027114439,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17002-4","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T09:02:27Z","timestamp":1695718947000},"page":"34581-34600","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["EASB: ECC based aggregate signature without bilinear pairing for blockchain"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0963-8038","authenticated-orcid":false,"given":"Sujit Sangram","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Chaurasiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"17002_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1:36\u201363","journal-title":"Int J Inf Secur"},{"key":"17002_CR2","unstructured":"Research C (2010) Ethereum signature generation Algorithm based on Secp256k1 Elliptic curve. Available at http:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"17002_CR3","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review"},{"key":"17002_CR4","unstructured":"wiki. Bitcoin signature generation Algorithm based on Secp256k1 Elliptic curve. Available at https:\/\/en.wikipedia.org\/wiki\/Bitcoin"},{"key":"17002_CR5","unstructured":"wiki. SEC 2: Recommended Elliptic Curve Domain Parameters. Available at https:\/\/en.wikipedia.org\/wiki\/Ethereum"},{"key":"17002_CR6","unstructured":"Standards for Efficient Cryptography Group (2009) SEC 1: Elliptic Curve Cryptography, Mar. 2009. Version 2.0. Available at https:\/\/www.secg.org\/sec1-v2.pdf"},{"key":"17002_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103134","volume":"144","author":"Z Gong","year":"2023","unstructured":"Gong Z, Gao T, Guo N (2023) PCAS: cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs. Ad Hoc Networks 144:103134","journal-title":"Ad Hoc Networks"},{"key":"17002_CR8","doi-asserted-by":"crossref","unstructured":"Yu S, Cao Q, Wang C, Xu G, Ma H, Zhu Y, Peng Y, Jia Y (2023) Efficient ECC-based Conditional Privacy-preserving Aggregation Signature Scheme in V2V. IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2023.3287989"},{"key":"17002_CR9","first-page":"1","volume":"2022","author":"MA Khan","year":"2022","unstructured":"Khan MA, Ullah I, Alsharif MH, Alghtani AH, Aly AA, Chen C-M (2022) An efficient certificate-based aggregate signature scheme for internet of drones. Security and Communication Networks 2022:1\u20139","journal-title":"Security and Communication Networks"},{"key":"17002_CR10","doi-asserted-by":"crossref","unstructured":"Sahoo SS, Chaurasiya VK (2023) Proof of location based delivery system using multi-party virtual state channel: a blockchain model. J Supercomput 1\u201331","DOI":"10.1007\/s11227-023-05510-x"},{"issue":"1","key":"17002_CR11","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/JSYST.2022.3180221","volume":"17","author":"Y Liang","year":"2022","unstructured":"Liang Y, Liu Y (2022) Analysis and improvement of an efficient certificateless aggregate signature with conditional privacy preservation in VANETs. IEEE Syst J 17(1):664\u2013672","journal-title":"IEEE Syst J"},{"key":"17002_CR12","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.cose.2019.04.007","volume":"84","author":"L Zhong","year":"2019","unstructured":"Zhong L, Wu Q, Xie J, Guan Z, Qin B (2019) A secure large-scale instant payment system based on blockchain. Comput Secur 84:349\u2013364","journal-title":"Comput Secur"},{"key":"17002_CR13","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in cryptology-EUROCRYPT 2003: international conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4\u20138, 2003 Proceedings 22, Springer, pp\u00a0416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"17002_CR14","doi-asserted-by":"crossref","unstructured":"Harris J, Zohar A (2020) Flood & loot: A systemic attack on the lightning network. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies pp\u00a0202\u2013213","DOI":"10.1145\/3419614.3423248"},{"key":"17002_CR15","unstructured":"Dziembowski S, Eckey L, Faust S, Malinowski D (2017) Perun: virtual payment hubs over cryptographic currencies. IACR Cryptology ePrint Archive 2017, Tech Rep"},{"key":"17002_CR16","doi-asserted-by":"crossref","unstructured":"Ahn JH, Green M, Hohenberger S (2010) Synchronized aggregate signatures: new definitions, constructions and applications. In: Proceedings of the 17th ACM conference on computer and communications security pp\u00a0473\u2013484","DOI":"10.1145\/1866307.1866360"},{"key":"17002_CR17","doi-asserted-by":"crossref","unstructured":"Selvi SSD, Vivek SS, Shriram J, Rangan CP (2012) Identity based partial aggregate signature scheme without pairing. In: 2012 35th IEEE sarnoff symposium, IEEE, pp\u00a01\u20136","DOI":"10.1109\/SARNOF.2012.6222731"},{"issue":"6","key":"17002_CR18","first-page":"1330","volume":"7","author":"J Chen","year":"2016","unstructured":"Chen J, Chen Q, Zou F (2016) Certificate-Based Aggregate Signature Scheme without Bilinear Pairings. J Inf Hiding Multim Signal Process 7(6):1330\u20131336","journal-title":"J Inf Hiding Multim Signal Process"},{"key":"17002_CR19","doi-asserted-by":"crossref","unstructured":"Zhao Y (2019) Practical aggregate signature from general elliptic curves, and applications to blockchain. In: Proceedings of the 2019 ACM asia conference on computer and communications security, pp\u00a0529\u2013538","DOI":"10.1145\/3321705.3329826"},{"key":"17002_CR20","first-page":"1","volume":"451","author":"J Cui","year":"2018","unstructured":"Cui J, Zhang J, Zhong H, Shi R, Xu Y (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf Sci 451:1\u201315","journal-title":"Inf Sci"},{"key":"17002_CR21","doi-asserted-by":"publisher","first-page":"6519","DOI":"10.1007\/s11042-014-2154-4","volume":"74","author":"K-H Yeh","year":"2015","unstructured":"Yeh K-H, Tsai K-Y, Fan C-Y (2015) An efficient certificateless signature scheme without bilinear pairings. Multimed Tools Appl 74:6519\u20136530","journal-title":"Multimed Tools Appl"},{"key":"17002_CR22","doi-asserted-by":"crossref","unstructured":"Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: Public key cryptography-PKC 2006: 9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24-26, 2006. Proceedings 9, Springer, pp\u00a0257\u2013273","DOI":"10.1007\/11745853_17"},{"issue":"5","key":"17002_CR23","first-page":"1479","volume":"19","author":"L Deng","year":"2018","unstructured":"Deng L, Yang Y, Chen Y, Wang X (2018) Aggregate signature without pairing from certificateless cryptography. J Internet Technol 19(5):1479\u20131486","journal-title":"J Internet Technol"},{"issue":"9","key":"17002_CR24","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1587\/transfun.2020DMP0023","volume":"104","author":"K Takemure","year":"2021","unstructured":"Takemure K, Sakai Y, Santoso B, Hanaoka G, Ohta K (2021) Achieving pairing-free aggregate signatures using pre-communication between signers. IEICE Trans Fundam Electron Commun Comput Sci 104(9):1188\u20131205","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"17002_CR25","doi-asserted-by":"crossref","unstructured":"Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B (2006) Sequential aggregate signatures and multisignatures without random oracles. In: Advances in cryptology-EUROCRYPT 2006: 24th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28-June 1, 2006. Proceedings 25, Springer, pp\u00a0465\u2013485","DOI":"10.1007\/11761679_28"},{"key":"17002_CR26","unstructured":"Bjoernsen K (2015) Koblitz Curves and its practical uses in Bitcoin security"},{"key":"17002_CR27","unstructured":"PCWorld. Overreliance on the NSA led to weak crypto standard, NIST advisers find. Available at http:\/\/www.pcworld.com\/article\/2454380\/overreliance-onthe-nsa-led-to-weak-crypto-standard-nist-advisers-find.html"},{"key":"17002_CR28","doi-asserted-by":"crossref","unstructured":"Shaikh JR, Nenova M, Iliev G, Valkova-Jarvis Z (2017) Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. In: 2017 IEEE international conference on microwaves, antennas, communications and electronic systems (COMCAS), IEEE, pp\u00a01\u20134","DOI":"10.1109\/COMCAS.2017.8244805"},{"key":"17002_CR29","unstructured":"Maxwell G. Signature Aggregation for Improved Scalablity. Available at https:\/\/bitcointalk.org\/index.php?topic=1377298.0"},{"key":"17002_CR30","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, pp\u00a062\u201373","DOI":"10.1145\/168588.168596"},{"key":"17002_CR31","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17:297\u2013319","journal-title":"J Cryptol"},{"key":"17002_CR32","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments"},{"key":"17002_CR33","unstructured":"Dziembowski S, Kkedzior P (2020) Non atomic payment splitting in channel networks. Cryptology ePrint Archive"},{"key":"17002_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100822","volume":"22","author":"SS Sahoo","year":"2023","unstructured":"Sahoo SS, Hosmane MM, Chaurasiya VK (2023) A secure payment channel rebalancing model for layer-2 blockchain. Internet of Things 22:100822","journal-title":"Internet of Things"},{"key":"17002_CR35","doi-asserted-by":"crossref","unstructured":"Sahoo SS, Hosmane MM, Menon AR, Chaurasiya VK (2022) Ethereum Compatible Faster Atomic Payment Splitting Network. In: 2022 IEEE 19th India council international conference (INDICON), IEEE, pp\u00a01\u20136","DOI":"10.1109\/INDICON56171.2022.10039895"},{"key":"17002_CR36","doi-asserted-by":"crossref","unstructured":"Hohenberger S, Waters B (2009) Realizing hash-and-sign signatures under standard assumptions. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp\u00a0333\u2013350","DOI":"10.1007\/978-3-642-01001-9_19"},{"key":"17002_CR37","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Gentry C, O\u2019Neill A, Yum DH (2007) Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: Proceedings of the 14th ACM conference on Computer and communications security, pp\u00a0276\u2013285","DOI":"10.1145\/1315245.1315280"},{"key":"17002_CR38","doi-asserted-by":"crossref","unstructured":"Sahoo SS, Menon AR, Chaurasiya VK (2023) Blockchain based n-party virtual payment model with concurrent execution. Arab J Sci Eng 1\u201328","DOI":"10.1007\/s13369-023-07899-2"},{"key":"17002_CR39","doi-asserted-by":"crossref","unstructured":"Ma D, Tsudik G (2007) Forward-secure sequential aggregate authentication. In: 2007 IEEE symposium on security and privacy (SP\u201907), IEEE, pp\u00a086\u201391","DOI":"10.1109\/SP.2007.18"},{"key":"17002_CR40","doi-asserted-by":"crossref","unstructured":"Hohenberger S, Sahai A, Waters B (2013) Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Advances in cryptology\u2013CRYPTO 2013: 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, Springer, pp\u00a0494\u2013512","DOI":"10.1007\/978-3-642-40041-4_27"},{"issue":"2","key":"17002_CR41","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1504\/IJESDF.2018.090961","volume":"10","author":"Y Qu","year":"2018","unstructured":"Qu Y, Mu Q (2018) An efficient certificateless aggregate signature without pairing. Int J Electron Secur Digit Forensic 10(2):188\u2013203","journal-title":"Int J Electron Secur Digit Forensic"},{"issue":"2","key":"17002_CR42","first-page":"225","volume":"33","author":"GN Bhagya","year":"2021","unstructured":"Bhagya GN, Thumbur G, Venkata KRRR, Reddy PV (2021) Efficient and secure pairing-free certificateless directed signature scheme. J King Saud Univ-Comput Inform Sci 33(2):225\u2013234","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"17002_CR43","doi-asserted-by":"crossref","unstructured":"Mohanty S, Sahoo SS, Majhi B (2016) Certificateless nominative signature scheme based upon DLP. In: 2016 international conference on electrical, electronics, and optimization techniques (ICEEOT), IEEE, pp\u00a01241\u20131245","DOI":"10.1109\/ICEEOT.2016.7754881"},{"key":"17002_CR44","doi-asserted-by":"publisher","first-page":"42683","DOI":"10.1109\/ACCESS.2019.2907298","volume":"7","author":"H Du","year":"2019","unstructured":"Du H, Wen Q, Zhang S (2019) An efficient certificateless aggregate signature scheme without pairings for healthcare wireless sensor network. IEEE Access 7:42683\u201342693","journal-title":"IEEE Access"},{"key":"17002_CR45","doi-asserted-by":"crossref","unstructured":"Sahoo SS, Chaurasiya VK (2023) VIBE: blockchain-based virtual payment in IoT ecosystem: a secure decentralized marketplace. Multimedi Tools Appl 1\u201326","DOI":"10.1007\/s11042-023-15634-0"},{"key":"17002_CR46","doi-asserted-by":"crossref","unstructured":"Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in cryptology\u2013EUROCRYPT 2005: 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, Springer, pp\u00a0114\u2013127","DOI":"10.1007\/11426639_7"},{"key":"17002_CR47","doi-asserted-by":"crossref","unstructured":"Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques, Springer, pp\u00a0417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"17002_CR48","first-page":"203","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Elliptic curve cryptosystems. Math Comput"},{"key":"17002_CR49","unstructured":"National Institute of Standards and Technology (1994) Digital signature standard. FIPS Publication, p\u00a0186, available at http:\/\/csrc.nist.gov\/encryption\/"},{"issue":"4","key":"17002_CR50","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"17002_CR51","doi-asserted-by":"crossref","unstructured":"Solinas JA (2000) Efficient arithmetic on Koblitz curves. Towards a Quarter-Century of Public Key Cryptography: A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International Journal. Volume 19, No\u00a02\/3 (2000) pp\u00a0125\u2013179","DOI":"10.1007\/978-1-4757-6856-5_6"},{"key":"17002_CR52","first-page":"415","volume-title":"An improved algorithm for computing logarithms over GF (p) and its cryptographic significance","author":"SC Pohlig","year":"2022","unstructured":"Pohlig SC, Hellman ME (2022) An improved algorithm for computing logarithms over GF (p) and its cryptographic significance. The Work of Whitfield Diffie and Martin Hellman, Democratizing cryptography, pp 415\u2013430"},{"issue":"143","key":"17002_CR53","first-page":"918","volume":"32","author":"JM Pollard","year":"1978","unstructured":"Pollard JM (1978) Monte Carlo methods for index computation (modp). Math Comput 32(143):918\u2013924","journal-title":"Math Comput"},{"key":"17002_CR54","doi-asserted-by":"crossref","unstructured":"Koblitz N (1991) CM-curves with good cryptographic properties. In: Annual international cryptology conference, Springer, pp\u00a0279\u2013287","DOI":"10.1007\/3-540-46766-1_22"},{"key":"17002_CR55","doi-asserted-by":"crossref","unstructured":"Boneh D, Drijvers M, Neven G (2018) Compact multi-signatures for smaller blockchains. In: International conference on the theory and application of cryptology and information security, Springer, pp\u00a0435\u2013464","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"17002_CR56","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361\u2013396","journal-title":"J Cryptol"},{"issue":"3","key":"17002_CR57","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"S Claus-Peter","year":"1991","unstructured":"Claus-Peter S (1991) Efficient signature generation by smart cards. J Cryptology 4(3):161\u2013174","journal-title":"J Cryptology"},{"issue":"2","key":"17002_CR58","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281\u2013308","journal-title":"SIAM J Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17002-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17002-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17002-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T13:18:19Z","timestamp":1712063899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17002-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":58,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["17002"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17002-4","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"8 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No Conflict.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}