{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T11:38:26Z","timestamp":1776425906516,"version":"3.51.2"},"publisher-location":"New York, NY","reference-count":11,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_22","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T21:05:53Z","timestamp":1194555953000},"page":"239-252","source":"Crossref","is-referenced-by-count":865,"title":["Efficient Identification and Signatures for Smart Cards"],"prefix":"10.1007","author":[{"given":"C. P.","family":"Schnorr","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45961-8_7","volume-title":"Proceedings of Eurocrypt\u2019 88","author":"T. Beth","year":"1988","unstructured":"BETH, T.: A Fiat-Shamir-like authentication protocol for the ElGamal scheme. Proceedings of Eurocrypt\u2019 88, Lecture Notes in Computer Science 330, (1988) pp. 77\u201386."},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Proceedings of Eurocrypt\u2019 87","author":"D. Chaum","year":"1988","unstructured":"CHAUM, D., EVERTSE, J.H. and van de GRAAF, J.: An Improved protocol for Demonstration Possession of Discrete Logarithms and some Generalizations. Proceedings of Eurocrypt\u2019 87, Lecture Notes in Computer Science 304, (1988), pp. 127\u2013141."},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"COPPERSMITH, D., ODLYZKO, A. and SCHROEPPEL, R.: Discrete Logarithms. Algorithmica 1, (1986), pp. 1\u201315.","journal-title":"Algorithmica"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Elgamal","year":"1985","unstructured":"ELGAMAL, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31 (1985), pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"FEIGE, U., FIAT, A. and SHAMIR, A.: Zero knowledge proofs of identity Proceedings of STOC 1987, pp. 210\u2013217.","DOI":"10.1145\/28395.28419"},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Proceedings of Crypto 1986","author":"A. Fiat","year":"1987","unstructured":"FIAT, A. and SHAMIR, A.: How to Prove Yourself: Practical Solutions of Identification and Signature Problems. Proceedings of Crypto 1986, in Lecture Notes in Computer Science (Ed. A. Odlyzko), Springer Verlag, 263, (1987) pp. 186\u2013194."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"GOLDWASSER, S., MICALI, S. and RACKOFF, C: Knowledge Complexity of Interactive Proof Systems. Proceedings of STOC 1985, pp. 291\u2013304.","DOI":"10.1145\/22145.22178"},{"key":"22_CR8","unstructured":"G\u00dcNTER, C.G.: Diffie-Hellman and ElGamal protocols with one single authentication key. Abstracts of Eurocrypt\u2019 89, Houthalen (Belgium) April 1989."},{"key":"22_CR9","unstructured":"MICALI, S. and SHAMIR, A.: An Improvement of the Fiat-Shamir Identification and Signature Scheme. Crypto 1988."},{"key":"22_CR10","unstructured":"QUISQUATER, J.J. and GUILLOU, L.S.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Proceedings Eurocrypt\u2019 88. Springer Verlag, Lecture Notes in Computer Sciences, vol. 330, (1988), pp. 123\u2013128."},{"key":"22_CR11","unstructured":"RABIN, M.O.: Digital signatures and public-key functions as intractable as factorization. Technical Report MIT\/LCS\/TR-212 (1978)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:28:09Z","timestamp":1619486889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_22","relation":{},"subject":[]}}