{"id":"https://openalex.org/W7117149560","doi":"https://doi.org/10.1109/access.2025.3648155","title":"On Key Substitution Attacks Against Aggregate Signatures and Multi-Signatures","display_name":"On Key Substitution Attacks Against Aggregate Signatures and Multi-Signatures","publication_year":2025,"publication_date":"2025-12-24","ids":{"openalex":"https://openalex.org/W7117149560","doi":"https://doi.org/10.1109/access.2025.3648155"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3648155","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648155","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3648155","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080639201","display_name":"Y Fujita","orcid":null},"institutions":[{"id":"https://openalex.org/I11381156","display_name":"Osaka Gakuin University","ror":"https://ror.org/04a8t1e98","country_code":"JP","type":"education","lineage":["https://openalex.org/I11381156"]},{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yuuki Fujita","raw_affiliation_strings":["The University of Osaka, Suita-shi, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita-shi, Osaka, Japan","institution_ids":["https://openalex.org/I98285908","https://openalex.org/I11381156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034439606","display_name":"Yusuke Sakai","orcid":"https://orcid.org/0000-0002-5115-8292"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yusuke Sakai","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087190591","display_name":"Kyosuke Yamashita","orcid":"https://orcid.org/0000-0001-7998-8039"},"institutions":[{"id":"https://openalex.org/I11381156","display_name":"Osaka Gakuin University","ror":"https://ror.org/04a8t1e98","country_code":"JP","type":"education","lineage":["https://openalex.org/I11381156"]},{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kyosuke Yamashita","raw_affiliation_strings":["The University of Osaka, Suita-shi, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita-shi, Osaka, Japan","institution_ids":["https://openalex.org/I98285908","https://openalex.org/I11381156"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047836988","display_name":"Goichiro Hanaoka","orcid":"https://orcid.org/0000-0001-6617-2962"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Goichiro Hanaoka","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology, Koto-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I73613424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080639201"],"corresponding_institution_ids":["https://openalex.org/I11381156","https://openalex.org/I98285908"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80838722,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"1592","last_page":"1617"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9283999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9283999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.008500000461935997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.006500000134110451,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/substitution","display_name":"Substitution (logic)","score":0.8050000071525574},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6367999911308289},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6110000014305115},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5663999915122986},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.5404999852180481},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.5273000001907349},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5271000266075134},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5037000179290771}],"concepts":[{"id":"https://openalex.org/C2778220771","wikidata":"https://www.wikidata.org/wiki/Q1522579","display_name":"Substitution (logic)","level":2,"score":0.8050000071525574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711899995803833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6869000196456909},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6367999911308289},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6110000014305115},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5663999915122986},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.5404999852180481},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.5273000001907349},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5271000266075134},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5037000179290771},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4496999979019165},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.42820000648498535},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.39480000734329224},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.35989999771118164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3522000014781952},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.3400999903678894},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.33500000834465027},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.33489999175071716},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2870999872684479},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3648155","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648155","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3648155","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648155","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5759547352790833}],"awards":[{"id":"https://openalex.org/G1353932043","display_name":null,"funder_award_id":"JPMJKP24U3","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G1558301864","display_name":null,"funder_award_id":"JP23H00468","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3381631784","display_name":null,"funder_award_id":"JPMJCR22M1","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G6028701963","display_name":null,"funder_award_id":"JP23K16881","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320334789","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W104938420","https://openalex.org/W1502931931","https://openalex.org/W1552030458","https://openalex.org/W1788452017","https://openalex.org/W1958513877","https://openalex.org/W1974244103","https://openalex.org/W2001431231","https://openalex.org/W2013689473","https://openalex.org/W2084091788","https://openalex.org/W2164736940","https://openalex.org/W2794661585","https://openalex.org/W2798365580","https://openalex.org/W2893239606","https://openalex.org/W2987645728","https://openalex.org/W3046248117","https://openalex.org/W3046597429","https://openalex.org/W3096294846","https://openalex.org/W3115751336","https://openalex.org/W4385654497","https://openalex.org/W4387351323","https://openalex.org/W4394741827","https://openalex.org/W4410134371","https://openalex.org/W4411085559","https://openalex.org/W4413205370"],"related_works":[],"abstract_inverted_index":{"The":[0],"most":[1],"fundamental":[2],"security":[3,92,148],"requirement":[4],"for":[5,170],"signature":[6,19,30,50,103,111,116,174],"schemes":[7,104,144],"is":[8,179],"unforgeability,":[9],"which":[10,37],"guarantees":[11],"that":[12],"no":[13],"one":[14],"can":[15],"create":[16],"a":[17,21,38,48,71,98],"valid":[18,49],"on":[20],"message":[22,43],"without":[23],"the":[24,42,53,68,108,113,122,131,143,156,162,192,195],"secret":[25],"signing":[26],"key.":[27],"However,":[28],"in":[29,36,84,182],"schemes,":[31],"there":[32],"are":[33,57],"potential":[34],"attacks":[35,56,66,96,189],"third":[39],"party":[40],"forges":[41],"and":[44,51,105,127,130],"verification":[45],"key":[46,61,94,150,187],"of":[47,70,97,101,142,173,194],"\u201chijacks\u201d":[52],"signature.":[54],"Such":[55],"referred":[58],"to":[59,158],"as":[60],"substitution":[62,65,95,151,188],"attacks.":[63,163],"Key":[64],"obscure":[67],"ownership":[69],"signature\u2014that":[72],"is,":[73],"who":[74],"actually":[75,180],"created":[76],"it\u2014and":[77],"therefore":[78],"must":[79],"be":[80,199],"taken":[81],"into":[82,201],"account":[83],"practical":[85,171],"applications.":[86],"In":[87],"this":[88],"article,":[89],"we":[90,154],"investigate":[91],"against":[93,149,161],"wide":[99],"range":[100],"aggregate":[102,110,115],"multi-signature":[106,123,133],"schemes:":[107],"Boneh-Gentry-Lynn-Shacham":[109],"scheme,":[112],"sequential":[114],"scheme":[117,124,134,157],"by":[118,125,135],"Lysyanskaya":[119],"et":[120,137],"al.,":[121],"Bellare":[126],"Neven,":[128],"MuSig2,":[129],"ordered":[132],"Boldyreva":[136],"al.":[138],"Furthermore,":[139],"if":[140,186],"any":[141],"does":[145],"not":[146],"provide":[147],"attacks,":[152],"then":[153],"modify":[155],"become":[159],"secure":[160],"This":[164],"paper":[165],"also":[166],"provides":[167],"important":[168],"insights":[169],"deployments":[172],"schemes.":[175],"For":[176],"example,":[177],"MuSig2":[178],"used":[181],"blockchain":[183],"systems,":[184],"but":[185],"were":[190],"possible,":[191],"authenticity":[193],"block":[196],"contents":[197],"would":[198],"called":[200],"question.":[202]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-24T00:00:00"}
