{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T17:09:27Z","timestamp":1767892167451,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Ministry of Internal Affairs and Communications","award":["JPJ000254"],"award-info":[{"award-number":["JPJ000254"]}]},{"name":"JSPS KAKENHI","award":["JP23K1688"],"award-info":[{"award-number":["JP23K1688"]}]},{"name":"JSPS KAKENHI","award":["JP23H00468"],"award-info":[{"award-number":["JP23H00468"]}]},{"name":"JST CREST","award":["JPMJCR22M1"],"award-info":[{"award-number":["JPMJCR22M1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3709015.3728675","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T18:31:14Z","timestamp":1749234674000},"page":"54-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5342-4530","authenticated-orcid":false,"given":"Yuuki","family":"Fujita","sequence":"first","affiliation":[{"name":"The University of Osaka, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5115-8292","authenticated-orcid":false,"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7998-8039","authenticated-orcid":false,"given":"Kyosuke","family":"Yamashita","sequence":"additional","affiliation":[{"name":"The University of Osaka, Osaka, Japan"},{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-2962","authenticated-orcid":false,"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8525163"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0071-2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_6_1","volume-title":"Bls signatures. Internet Draft draft-irtf-cfrg-bls-signature-05. (Dec","author":"Boneh Dan","year":"2022","unstructured":"Dan Boneh, Sergey Gorbunov, Riad S. Wahby, Hoeteck Wee, Christopher A. Wood, and Zhenfei Zhang. 2022. Bls signatures. Internet Draft draft-irtf-cfrg-bls-signature-05. (Dec. 2022)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00093"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339813"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57718-5\\_7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"e_1_3_2_1_12_1","volume-title":"Security of signature schemes in a multi-user setting. Des. Codes Cryptography, 33, (Nov","author":"Menezes Alfred","year":"2004","unstructured":"Alfred Menezes and Nigel Smart. 2004. Security of signature schemes in a multi-user setting. Des. Codes Cryptography, 33, (Nov. 2004), 261\u2013274."},{"key":"e_1_3_2_1_13_1","volume-title":"Musig2 for bip340-compatible multi-signatures. BIP327. (Mar","author":"Nick Jonas","year":"2022","unstructured":"Jonas Nick, Tim Ruffing, and Elliott Jin. 2022. Musig2 for bip340-compatible multi-signatures. BIP327. (Mar. 2022)."},{"key":"e_1_3_2_1_14_1","volume-title":"CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part I. Springer-Verlag","author":"Nick Jonas","year":"2021","unstructured":"Jonas Nick, Tim Ruffing, and Yannick Seurin. 2021. Musig2: simple two-round schnorr multi-signatures. In Advances in Cryptology - CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part I. Springer-Verlag, Berlin, Heidelberg, 189\u2013221."},{"key":"e_1_3_2_1_15_1","volume-title":"Call for additional digital signature schemes for the post-quantum cryptography standardization process. (Oct","author":"The National Institute of Standards and Technology. 2022.","year":"2022","unstructured":"The National Institute of Standards and Technology. 2022. Call for additional digital signature schemes for the post-quantum cryptography standardization process. (Oct. 2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"Annual International Cryptology Conference. Springer, 159\u2013190","author":"Park Sunoo","year":"2019","unstructured":"Sunoo Park and Adam Sealfon. 2019. It wasn't me! repudiability and un-claimability of ring signatures. In Annual International Cryptology Conference. Springer, 159\u2013190."},{"key":"e_1_3_2_1_17_1","volume-title":"Stern","author":"Pornin Thomas","year":"2005","unstructured":"Thomas Pornin and Julien P. Stern. 2005. Digital signatures do not guarantee exclusive ownership. In Applied Cryptography and Network Security. Springer Berlin Heidelberg, Berlin, Heidelberg, 138\u2013150."},{"key":"e_1_3_2_1_18_1","unstructured":"Barnes Richard Hoffman-Andrews Jacob and Kasten James. 2015. Automatic certificate management environment (ACME). (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_42"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591866.3593071"}],"event":{"name":"APKC '25: 12th ACM ASIA Public-Key Cryptography Workshop","location":"Meli\u00e1 Hanoi Hanoi Vietnam","acronym":"APKC '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM ASIA Public-Key Cryptography Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709015.3728675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709015.3728675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":20,"alternative-id":["10.1145\/3709015.3728675","10.1145\/3709015"],"URL":"https:\/\/doi.org\/10.1145\/3709015.3728675","relation":{},"subject":[],"published":{"date-parts":[[2025,8,25]]},"assertion":[{"value":"2025-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}