{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:54:16Z","timestamp":1766048056918},"publisher-location":"New York, NY","reference-count":16,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_2","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"6-16","source":"Crossref","is-referenced-by-count":9,"title":["Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context"],"prefix":"10.1007","author":[{"given":"Yvo G.","family":"Desmedt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"L. Babai. Trading group theory for randomness. In Proceedings of the seventeenth ACM Symp. Theory of Computing, STOC, pp. 421\u2013429, May 6\u20138, 1985.","DOI":"10.1145\/22145.22192"},{"key":"2_CR2","unstructured":"M. V. D. Burmester and Y. G. Desmedt, June 1989. Text in preparation."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp. 103\u2013112, May 2\u20134, 1988.","DOI":"10.1145\/62212.62222"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp. 113\u2013131, May 2\u20134, 1988.","DOI":"10.1145\/62212.62223"},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-47721-7_14","volume-title":"Advances in Cryptology. Proc. Crypto\u201986","author":"D. Chaum","year":"1987","unstructured":"D. Chaum, J.-H. Evertse, J. van de Graaf, and R. Peralta. Demonstrating possession of a discrete logarithm without revealing it. In A. Odlyzko, editor, Advances in Cryptology. Proc. Crypto\u201986 (Lecture Notes in Computer Science 263), pp. 200\u2013212 Springer-Verlag, 1987. Santa Barbara, California, U.S.A., August 11\u201315."},{"key":"2_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Crypto\u201988","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt. Abuses in cryptography and how to fight them. Presented at Crypto\u201988, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto\u201988 (Lecture Notes in Computer Science), Springer-Verlag, August 1988."},{"key":"2_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-45961-8_3","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u201988","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt. Subliminal-free authentication and signature. In C. G. G\u00fcnther, editor, Advances in Cryptology, Proc. of Eurocrypt\u201988 (Lecture Notes in Computer Science 330), pp. 23\u201333. Springer-Verlag, May 1988. Davos, Switzerland."},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281\u2013308, April 1988.","journal-title":"Siam J. Comput."},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1), pp. 186\u2013208, February 1989.","journal-title":"Siam J. Comput."},{"issue":"3","key":"2_CR10","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. Gilbert","year":"1974","unstructured":"E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3), pp. 405\u2013424, March 1974.","journal-title":"The BELL System Technical Journal"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In The Computer Society of IEEE, 27th Annual Symp. on Foundations of Computer Science (FOCS), pp. 174\u2013187. IEEE Computer Society Press, 1986. Toronto, Ontario, Canada, October 27\u201329,1986.","DOI":"10.1109\/SFCS.1986.47"},{"issue":"A","key":"2_CR12","first-page":"115","volume":"21","author":"T. C. Jones","year":"1986","unstructured":"T. C. Jones and J. Seberry. Authentication without secrecy. ARS Combinatoria, 21(A), pp. 115\u2013121, May 1986.","journal-title":"ARS Combinatoria"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication theory of secrecy systems. Bell System Techn. Jour., 28, pp. 656\u2013715, October 1949.","journal-title":"Bell System Techn. Jour."},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology. Proc. of Crypto 83","author":"G. J. Simmons","year":"1984","unstructured":"G. J. Simmons. The prisoners\u2019 problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology. Proc. of Crypto 83, pp. 51\u201367. Plenum Press N.Y., 1984. Santa Barbara, California, August 1983."},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/3-540-39757-4_25","volume-title":"Advances in Cryptology. Proc. of Eurocrypt 84","author":"G. J. Simmons","year":"1985","unstructured":"G. J. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology. Proc. of Eurocrypt 84 (Lecture Notes in Computer Science 209), pp. 364\u2013378. Springer-Verlag, Berlin, 1985. Paris, France, April 9\u201311, 1984."},{"key":"2_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-39799-X_5","volume-title":"Advances in Cryptology. Proc. of Crypto 85","author":"G. J. Simmons","year":"1986","unstructured":"G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. Proc. of Crypto 85 (Lecture Notes in Computer Science 218), pp. 33\u201341. Springer-Verlag, 1986. Santa Barbara, California, August 18\u201322, 1985."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:19:17Z","timestamp":1605644357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_2","relation":{},"subject":[]}}