{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:21Z","timestamp":1725475821838},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_14","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"163-177","source":"Crossref","is-referenced-by-count":1,"title":["A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masayuki","family":"Kanda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th annual ACM Symposium on the Theory of Computing, pp. 1\u201310 (1988)","key":"14_CR1","DOI":"10.1145\/62212.62213"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/3-540-49649-1_30","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"M. Burmester","year":"1998","unstructured":"Burmester, M., Desmedt, Y., Seberry, J.: Equitable key escrow with limited time span (or how to enforce time expiration cryptographically). In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 380\u2013391. Springer, Heidelberg (1998)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D.L. Chaum","year":"1993","unstructured":"Chaum, D.L., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th IEEE Annual Symposium on Foundations of Computer Science, pp. 427\u2013437 (1987)","key":"14_CR4","DOI":"10.1109\/SFCS.1987.4"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/3-540-44750-4_18","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"Y.. Frankel","year":"1995","unstructured":"Frankel, Y., Yung, M.: Escrow encryption systems visited: Attacks, analysis and designs. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 222\u2013235. Springer, Heidelberg (1995)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/BFb0032349","volume-title":"Cryptography: Policy and Algorithms","author":"N. Jefferies","year":"1996","unstructured":"Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E.P., Goli\u0107, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol.\u00a01029, pp. 98\u2013104. Springer, Heidelberg (1996)"},{"unstructured":"Kuroda, I., Kanda, M., Miyazaki, S., Sakurai, K.: Notes on international key escrow system. In: The Proceedings of the 1998 Symposium on Cryptography and Information Security, number 5.2.C in SCIS 1998 (1998)","key":"14_CR7"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/3-540-44750-4_16","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A.K. Lenstra","year":"1995","unstructured":"Lenstra, A.K., Winkler, P., Yacobi, Y.: A key escrow system with warrant bounds. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 197\u2013207. Springer, Heidelberg (1995)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-48071-4_9","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"S. Micali","year":"1993","unstructured":"Micali, S.: Fair public key cryptosystems. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 113\u2013138. Springer, Heidelberg (1993)"},{"unstructured":"Pfitzmann, B., Waidner, M.: How to break fraud-detectable key recovery. Technical Report RZ 2970, IBM (March 1997)","key":"14_CR10"},{"unstructured":"Sakurai, K., Yamane, Y., Miyazaki, S., Inoue, T.: A key escrow system with protecting user\u2019s privacy by blind decoding. In: 1997 Information Security Workshop, pp. 87\u201396 (1997)","key":"14_CR11"},{"unstructured":"Sameshima, Y.: A key escrow system of the RSA cryptosystem. In: 1997 Information Security Workshop, pp. 75\u201385 (1997)","key":"14_CR12"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/3-540-69053-0_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Binding ElGamal: A fraud-detectable alternative to key-escrow proposals. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 119\u2013133. Springer, Heidelberg (1997)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0054114","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Young","year":"1998","unstructured":"Young, A., Yung, M.: Auto-recoverable auto-certifiable cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 17\u201331. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T23:28:37Z","timestamp":1552865317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/10718964_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}