{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T05:27:22Z","timestamp":1648704442996},"reference-count":14,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1080\/01611190008984245","type":"journal-article","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T23:58:10Z","timestamp":1187827090000},"page":"250-268","source":"Crossref","is-referenced-by-count":4,"title":["(t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS"],"prefix":"10.1080","volume":"24","author":[{"given":"Chuan-Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Narn-Yih","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Juin-Jang","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","first-page":"457","volume-title":"Advances in Cryptology - Crypto '91, Proceedings","author":"Desmed Y.","year":"1991"},{"key":"CIT0002","first-page":"61","volume-title":"Workshop on Cryptography & Data Security, Proceedings","author":"Harn L.","year":"1993"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"CIT0004","first-page":"413","author":"Li C","year":"1993","journal-title":"Advances in Cryptology - Crypto '93, Proceedings."},{"key":"CIT0005","first-page":"1","volume":"71","author":"Itakura K.","year":"1983","journal-title":"NEC Research and Develop."},{"key":"CIT0006","unstructured":"National Institute of Standards and Technology. 1984 . The Digital Signature Standard.Federal Information Processing Standards Publication186. May."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1049\/el:19930747"},{"key":"CIT0008","first-page":"16","volume-title":"Advances in Cryptology - AUS-CRYPTO'92","author":"Hardjono T.","year":"1992"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1049\/el:19890670"},{"key":"CIT0010","first-page":"75","volume-title":"Advances in Cryptoloy - ASIACRYPT'91","author":"Ohta K.","year":"1991"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/48012.48246"},{"key":"CIT0012","first-page":"285","volume-title":"Advances in Cryptology - Crypto '90, Proceedings","author":"Zheng Y.","year":"1990"},{"key":"CIT0013","first-page":"354","volume-title":"Advances in Cryptology - Eurocrypto '96, Proceedings","author":"Gennaro R.","year":"1996"},{"key":"CIT0014","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BFb0055722","volume-title":"Advances in Cryptology - Crypto '98, Proceedings","author":"Rabin T.","year":"1998"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611190008984245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:15:31Z","timestamp":1497723331000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01611190008984245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["10.1080\/01611190008984245"],"URL":"https:\/\/doi.org\/10.1080\/01611190008984245","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}