{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:52Z","timestamp":1750220812290,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342010","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis and Improvement of Identity-Based Multisignature Scheme"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Mohammedi","sequence":"first","affiliation":[{"name":"Laboratoire d'Informatique M\u00e9dicale, Universit\u00e9 de Bejaia, Bejaia, Alg\u00e9rie"}]},{"given":"Mawloud","family":"Omar","sequence":"additional","affiliation":[{"name":"Unit\u00e9 de Recherche LaMOS, Universit\u00e9 de Bejaia, Bejaia, Alg\u00e9rie"}]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[{"name":"Sorbonne universit\u00e9s, Universit\u00e9 de technologie de Compi\u00e8gne, CNRS, Compi\u00e8gne cedex, France"}]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[{"name":"Sorbonne universit\u00e9s, Universit\u00e9 de technologie de Compi\u00e8gne, CNRS, Compi\u00e8gne cedex, France"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Stateful public-key encryption: A security solution for resource-constrained environment","volume":"7","author":"Baek J.","year":"2018","unstructured":"J. Baek , W. Susilo , K. Salah , J.S. Ha , E. Damiani , and I. You . 2018 . Stateful public-key encryption: A security solution for resource-constrained environment . Advances in Cyber Security: Principles, Techniques, and Applications 7 (2018), 1 -- 22 . J. Baek, W. Susilo, K. Salah, J.S. Ha, E. Damiani, and I. You. 2018. Stateful public-key encryption: A security solution for resource-constrained environment. Advances in Cyber Security: Principles, Techniques, and Applications 7 (2018), 1--22.","journal-title":"Advances in Cyber Security: Principles, Techniques, and Applications"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891075"},{"volume-title":"Proceedings of the 25th International Conference on Systems Engineering. 324--330","author":"Guesmi H.","key":"e_1_3_2_1_3_1","unstructured":"H. Guesmi and L.A. Sa\u00efdane . 2017. Improved data storage confidentiality in cloud computing using identity-based cryptography . In Proceedings of the 25th International Conference on Systems Engineering. 324--330 . H. Guesmi and L.A. Sa\u00efdane. 2017. Improved data storage confidentiality in cloud computing using identity-based cryptography. In Proceedings of the 25th International Conference on Systems Engineering. 324--330."},{"key":"e_1_3_2_1_4_1","volume-title":"AUSCRYPT","author":"Hardjono T.","year":"1992","unstructured":"T. Hardjono and Y. Zheng . 1992. A practical digital multisignature scheme based on discrete logarithms. In: Seberry J., Zheng Y. (eds) Advances in Cryptology --- AUSCRYPT '92 . AUSCRYPT 1992 . Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg, 122--132. T. Hardjono and Y. Zheng. 1992. A practical digital multisignature scheme based on discrete logarithms. In: Seberry J., Zheng Y. (eds) Advances in Cryptology --- AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg, 122--132."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941293"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990166"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.03.003"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of IEEE International Conference on Consumer Electronics. 251--252","author":"Naoto Y.","year":"2017","unstructured":"Y. Naoto . 2017 . Tightly secure identity-based multisignatures . In Proceedings of IEEE International Conference on Consumer Electronics. 251--252 . Y. Naoto. 2017. Tightly secure identity-based multisignatures. In Proceedings of IEEE International Conference on Consumer Electronics. 251--252."},{"key":"e_1_3_2_1_9_1","volume-title":"Contemporary Mathematics","author":"Odlyzko A.M.","year":"1994","unstructured":"A.M. Odlyzko . 1994. Discrete logarithms and smooth polynomials. In finite fields: Theory, Applications, and Algorithms. G-L. Mullen & P-J-S. Shiue , Contemporary Mathematics , ( American Mathematical Society) ( 1994 ). A.M. Odlyzko. 1994. Discrete logarithms and smooth polynomials. In finite fields: Theory, Applications, and Algorithms. G-L. Mullen & P-J-S. Shiue, Contemporary Mathematics, (American Mathematical Society) (1994)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126699000189"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.033"},{"key":"e_1_3_2_1_13_1","first-page":"2","article-title":"ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures","volume":"131","author":"Wu T.S.","year":"2002","unstructured":"T.S. Wu and C.L. Hsu . 2002 . ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures . Appl. Math. Comput. 131 , 2 - 3 (2002), 349--356. T.S. Wu and C.L. Hsu. 2002. ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures. Appl. Math. Comput. 131, 2-3 (2002), 349--356.","journal-title":"Appl. Math. Comput."},{"volume-title":"Proceedings of the International Conference on Hybrid Information Technology. 492--495","author":"Yoon E.J.","key":"e_1_3_2_1_14_1","unstructured":"E.J. Yoon and K.Y. Yoo . 2006. Cryptanalysis of two multisignature schemes with distinguished signing authorities . In Proceedings of the International Conference on Hybrid Information Technology. 492--495 . E.J. Yoon and K.Y. Yoo. 2006. Cryptanalysis of two multisignature schemes with distinguished signing authorities. In Proceedings of the International Conference on Hybrid Information Technology. 492--495."},{"volume-title":"Proceedings of the 8th International Conference on Electronic Measurement and Instruments. 340--343","author":"Zhang Y.","key":"e_1_3_2_1_15_1","unstructured":"Y. Zhang , K. Yang , Y. Wang , and Z. Zhou . 2007. Research on protecting the safety in web system with SSL . In Proceedings of the 8th International Conference on Electronic Measurement and Instruments. 340--343 . Y. Zhang, K. Yang, Y. Wang, and Z. Zhou. 2007. Research on protecting the safety in web system with SSL. In Proceedings of the 8th International Conference on Electronic Measurement and Instruments. 340--343."}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":15,"alternative-id":["10.1145\/3341325.3342010","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342010","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}