1. Boneh, D., Durfee, G., Franklin, M.K.: Lower bounds for multicast message authentication. In: EUROCRYPT, LNCS, vol. 2045, pp. 437–452. Springer, Heidelberg (2001)
2. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT, LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
3. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: INFOCOM, vol. 2, pp. 708–716. IEEE Press, New York (1999)
4. Chan, A.F., Castelluccia, C.: On the (im)possibility of aggregate message authentication codes. In: IEEE International Symposium on Information Theory, 2008. ISIT 2008. pp. 235–239 (2008)
5. Chan, H., Perrig, A.: Round-efficient broadcast authentication protocols for fixed topology classes. In: IEEE Symposium on Security and Privacy, pp. 257–272. IEEE Computer Society (2010)