{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:43Z","timestamp":1766281003035},"publisher-location":"New York, NY","reference-count":20,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_29","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"375-389","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Abuses in Cryptography and How to Fight Them"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"J. A. Adam. Ways to verify the U.S.-Soviet arms pact. IEEE Spectrum, pp. 30\u201334, February 1988.","DOI":"10.1109\/6.4507"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"G. Brassard and C. Crepeau. Non-transitive transfer of confidence: a perfect zero-knowledge interactive protocol for SAT and beyond. In 27th Annual Symp. on Foundations of Computer Science (FOCS), pp. 188\u2013195, IEEE Computer Society Press, October 27\u201329 1986. Toronto, Ontario, Canada.","DOI":"10.1109\/SFCS.1986.33"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp. 103\u2013112, May 2\u20134, 1988.","DOI":"10.1145\/62212.62222"},{"key":"29_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-39568-7_23","volume-title":"Advances in Cryptology. Proc. of Crypto\u2019 84","author":"M. Blum","year":"1985","unstructured":"M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In Advances in Cryptology. Proc. of Crypto\u2019 84 (Lecture Notes in Computer Science 196), pp. 289\u2013299, Springer-Verlag, New York, 1985. Santa Barbara, August 1984."},{"key":"29_CR5","unstructured":"M. Blum. Coin flipping by telephone \u2014 a protocol for solving impossible problems. In digest of papers COMPCON82, pp. 133\u2013137, IEEE Computer Society, February 1982."},{"key":"29_CR6","unstructured":"Department of Defense Trusted Computer System Evaluation Criteria. U.S. Department of Defense, August 15 1983. Also known as the Orange Book."},{"key":"29_CR7","unstructured":"Y. Desmedt. Abuse-free cryptosystems: particularly subliminal-free authentication and signature. In preparation, available from author when finished."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Y. Desmedt. Subliminal-free authentication and signature. May 1988. Presented at Eurocrypt\u201988, Davos, Switzerland, to appear in: Advances in Cryptology. Proc. of Eurocrypt 88 (Lecture Notes in Computer Science), Springer-Verlag.","DOI":"10.1007\/3-540-45961-8_3"},{"key":"29_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pp. 21\u201339, Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16\u201320."},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. In Proceedings of the Nineteenth ACM Symp. Theory of Computing, STOC, pp. 210\u2013217, May 25\u201327, 1987.","DOI":"10.1145\/28395.28419"},{"key":"29_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u2019 86 (Lecture Notes in Computer Science 263), pp. 186\u2013194, Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11\u201315."},{"issue":"1","key":"29_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"Shafi Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. to appear in Siam J. Comput., vol. 18, No. 1, January 1989.","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"29_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281\u2013308, April 1988.","journal-title":"Siam J. Comput."},{"key":"29_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-47721-7_11","volume-title":"Advances in Cryptology, Proc. of Crypto\u201986","author":"O. Goldreich","year":"1987","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to prove all NP statements in zero-knowledge and a methodolgy of cryptographic protocol design. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u201986 (Lecture Notes in Computer Science 263), pp. 171\u2013185, Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11\u201315."},{"issue":"10","key":"29_CR15","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. W. Lampson","year":"1973","unstructured":"B. W. Lampson. A note on the confinement problem. Comm. ACM, 16(10), pp. 613\u2013615, October 1973.","journal-title":"Comm. ACM"},{"issue":"4","key":"29_CR16","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/356789.356794","volume":"11","author":"G. J. Popek","year":"1979","unstructured":"G. J. Popek and C. S. Kline. Encryption and secure computer networks. ACM Computing Surveys, 11(4), pp. 335\u2013356, December 1979.","journal-title":"ACM Computing Surveys"},{"key":"29_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-39805-8_3","volume-title":"Advances in Cryptology. Proc. of Eurocrypt 85","author":"R. L. Rivest","year":"1986","unstructured":"R. L. Rivest and A. Shamir. Efficient factoring based on partial information. In F. Pichler, editor, Advances in Cryptology. Proc. of Eurocrypt 85 (Lecture Notes in Computer Science 209), pp. 31\u201334, Springer-Verlag, Berlin, 1986."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. Verification of treaty compliance-revisited. In Proc. of the 1983 IEEE Symposium on Security and Privacy, pp. 61\u201366, IEEE Computer Society Press, April 25\u201327 1983. Oakland, California.","DOI":"10.1109\/SP.1983.10016"},{"key":"29_CR19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology. Proc. of Crypto 83","author":"G. J. Simmons","year":"1984","unstructured":"G. J. Simmons. The prisoners\u2019 problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology. Proc. of Crypto 83, pp. 51\u201367, Plenum Press N.Y., 1984. Santa Barbara, California, August 1983."},{"issue":"5","key":"29_CR20","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/5.4446","volume":"76","author":"G. J. Simmons","year":"1988","unstructured":"G. J. Simmons. How to insure that data acquired to verify treaty compliance are trustworthy. Proc. IEEE, 76(5), pp. 621\u2013627, May 1988.","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T16:53:16Z","timestamp":1587833596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_29"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}