{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:21:53Z","timestamp":1768281713579,"version":"3.49.0"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"JSPS KAKENHI, Japan","award":["JP23H00468"],"award-info":[{"award-number":["JP23H00468"]}]},{"name":"JSPS KAKENHI, Japan","award":["JP23K16881"],"award-info":[{"award-number":["JP23K16881"]}]},{"name":"JST CREST, Japan","award":["JPMJCR22M1"],"award-info":[{"award-number":["JPMJCR22M1"]}]},{"name":"JST K Program, Japan","award":["JPMJKP24U3"],"award-info":[{"award-number":["JPMJKP24U3"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3648155","type":"journal-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:46:53Z","timestamp":1766602013000},"page":"1592-1617","source":"Crossref","is-referenced-by-count":0,"title":["On Key Substitution Attacks Against Aggregate Signatures and Multi-Signatures"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5342-4530","authenticated-orcid":false,"given":"Yuuki","family":"Fujita","sequence":"first","affiliation":[{"name":"The University of Osaka, Suita-shi, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5115-8292","authenticated-orcid":false,"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7998-8039","authenticated-orcid":false,"given":"Kyosuke","family":"Yamashita","sequence":"additional","affiliation":[{"name":"The University of Osaka, Suita-shi, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-2962","authenticated-orcid":false,"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0071-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/B:DESI.0000036250.18062.3f"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49162-7_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00093"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2023CIP0016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339813"},{"key":"ref9","article-title":"Automatic certificate management environment (ACME)","author":"Richard","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1515\/tmmp-2017-0022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8525163"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315280"},{"key":"ref18","volume-title":"Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-91826-1_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/csf64896.2025.00027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57718-5_7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38557-5_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_42"},{"key":"ref25","article-title":"Bls signatures","author":"Boneh","year":"2022"},{"key":"ref26","article-title":"Musig2 for bip340-compatible multi-signatures","author":"Nick","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3709015.3728675"},{"key":"ref28","article-title":"On pairing-based signature and aggregate signature schemes","author":"Knapp","year":"2008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9196-7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11314511.pdf?arnumber=11314511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:03:02Z","timestamp":1768255382000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11314511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3648155","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}