{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:13Z","timestamp":1725494473262},"publisher-location":"New York, NY","reference-count":19,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_32","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T21:05:53Z","timestamp":1194555953000},"page":"344-355","source":"Crossref","is-referenced-by-count":18,"title":["On Key Distribution Systems"],"prefix":"10.1007","author":[{"given":"Y.","family":"Yacobi","sequence":"first","affiliation":[]},{"given":"Z.","family":"Shmuely","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Ben-David, S., Chor, B., Goldreich, O., Luby, M.: \u201cOn the Theory of Average Case Complexity\u201d, STOC, 1989 pp. 204\u2013216.","DOI":"10.1145\/73007.73027"},{"key":"32_CR2","unstructured":"Bauspiess, F., Knobloch, H.: \u201cHow to Keep Authenticity Alive in a Computer Network\u201d, Eurocrypt\u201989."},{"issue":"1\u20133","key":"32_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0019-9958(82)90401-6","volume":"55","author":"D. Dolev","year":"1982","unstructured":"Dolev, D., Even, E., Karp, R.M.: \u201cOn the Security of Ping-Pong Protocols\u201d, Information and Control, Vol. 55, Nos 1\u20133, Nov. Dec. 1982, pp. 57\u201368.","journal-title":"Information and Control"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: \u201cNew Directions In Cryptography\u201d, IEEE Trans. on Inf. Theory, 1976, IT-22, pp. 644\u2013654.","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"32_CR5","unstructured":"Fiat, A., Shamir, A.: \u201cHow to Prove Yourself: Practical Solutions to Identification and Signature Problems\u201d, Proceedings of Crypto 86."},{"key":"32_CR6","unstructured":"G\u00fcnther, C.G.: \u201cDiffie-Hellman and El-Gamal Protocols With One Single Authentication Key\u201d, Eurocrypt\u201989."},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Galil, Z., Haber, S., Yung, M.: \u201cMinimum-Knowledge Interactive Proofs for Decision Problems\u201d, SIAM J. on Computers Vol. 18, No. 4, Aug. 1989.","DOI":"10.1137\/0218049"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Levin, A.L.: \u201cA Hard-Core Predicate for All One-Way Functions\u201d, STOC\u201989, pp. 25\u201332.","DOI":"10.1090\/ulect\/055\/09"},{"issue":"2","key":"32_CR9","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.,: \u201cProbabilistic Encryption\u201d, JCSS, Vol. 28, No. 2, 1984, pp. 270\u2013279.","journal-title":"JCSS"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C: \u201cThe knowledge Complexity of Interactive Proof Systems\u201d, Proc. 17th ACM Symposium on Theory of Computing 1985, and SIAM 1989.","DOI":"10.1137\/0218012"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: \u201cHow to Play Any Mental Game\u201d, Proc. STOC 1987, pp 218\u2013229","DOI":"10.1145\/28395.28420"},{"key":"32_CR12","unstructured":"Hopcroft, J.E., Ullman, J.D.: \u201cIntroduction to automata theory, languages, & computation\u201d Addison-Wesley, 1979"},{"key":"32_CR13","unstructured":"Koyama, K., Ohta, K.: \u201cIdentity Based Conference Key Distribution Systems\u201d, Proc. Crypto\u201987."},{"issue":"2","key":"32_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. \u201c. McCurley","year":"1988","unstructured":"McCurley, K.S.: \u201cA Key Distribution System Equivalent to Factoring\u201d, J. of Cryptology, Vol.1, No. 2, 1988, pp. 95\u2013106.","journal-title":"J. of Cryptology"},{"key":"32_CR15","unstructured":"Matsumoto, T., Takashima, Y., Imai, H.: \u201cOn Seeking Smart Public-Key-Distribution Systems\u201d, Trans. of IECE Japan Vo. E 69, No. 2, Feb 1986."},{"key":"32_CR16","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1049\/el:19860880","volume":"22","author":"E. \u201c. Okamoto","year":"1986","unstructured":"Okamoto, E.: \u201cProposal for Identity-Based Key Distribution Systems\u201d, Electronic Letters 1986, 22, pp. 1283,1284.","journal-title":"Electronic Letters"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., and Adelman, L.: \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Commun. ACM 1978, 21, pp. 120\u2013126.","journal-title":"Commun. ACM"},{"key":"32_CR18","unstructured":"Shmuely, Z.: \u201cComposite Diffie-Hellman Public-Key Generating Systems Are Hard to Break\u201d, TR #356, Computer Science Dept. Technion, IIT, Feb. 1985."},{"key":"32_CR19","unstructured":"Yacobi, Y.: \u201cAttack on The Koyama-Ohta Identity Based Key-Distribution System\u201d, Proc. Crypto\u201987."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:28:13Z","timestamp":1619486893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_32","relation":{},"subject":[]}}