{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:52:56Z","timestamp":1725573176988},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540330523"},{"type":"electronic","value":"9783540330585"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11689522_29","type":"book-chapter","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T06:47:58Z","timestamp":1140850078000},"page":"314-320","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of a Server-Aided RSA Key Generation Protocol"],"prefix":"10.1007","author":[{"given":"Tianjie","family":"Cao","sequence":"first","affiliation":[]},{"given":"Xianping","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"29_CR1","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1049\/el:19920937","volume":"28","author":"R.J. Anderson","year":"1992","unstructured":"Anderson, R.J.: Attack on Server-Assisted Authentication Protocols. IEE Electronics Letters\u00a028(15), 1473 (1992)","journal-title":"IEE Electronics Letters"},{"key":"29_CR2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.3233\/JCS-1997-5105","volume":"5","author":"N. Asokan","year":"1997","unstructured":"Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security\u00a05, 91\u2013108 (1997)","journal-title":"Journal of Computer Security"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0065-2458(01)80019-X","volume":"54","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure Outsourcing of Scientific Computations. Advances in Computers\u00a054, 215\u2013272 (2001)","journal-title":"Advances in Computers"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/3-540-44750-4_5","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"P. B\u00e9guin","year":"1995","unstructured":"B\u00e9guin, P., Quisquater, J.-J.: Fast Server-Aided RSA Signatures Secure Against Active Attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 57\u201369. Springer, Heidelberg (1995)"},{"key":"29_CR5","first-page":"143","volume":"6","author":"K. Bicakci","year":"2004","unstructured":"Bicakci, K., Baykal, N.: Server Assisted Signatures Revisited. CT-RSA 2004\u00a06, 143\u2013156 (2004)","journal-title":"CT-RSA 2004"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., Tsudik, G.: Improving Secure Server Performance by Re-balancing SSL\/TLS Handshakes, Cryptology ePrint Archive No.2005\/037 (2005)","DOI":"10.1145\/1128817.1128826"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11801412_4","volume-title":"Secure Mobile Ad-hoc Networks and Sensors","author":"Y. Chen","year":"2006","unstructured":"Chen, Y., Safavi-Naini, R., Baek, J.: Server-Aided RSA Key Generation against Collusion Attack. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol.\u00a04074, pp. 27\u201337. Springer, Heidelberg (2006)"},{"key":"29_CR8","unstructured":"Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: Network and Distributed Systems Security Symposium, NDSS 2002 (2002)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Ford, W., Kaliski, B.S.: Server-assisted generation of a strong secret from a password. In: 5th IEEE International Workshop on Enterprise Security, pp. 176\u2013180 (2000)","DOI":"10.1109\/ENABL.2000.883724"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/11593447_33","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"M. Girault","year":"2005","unstructured":"Girault, M., Lefranc, D.: Server-Aided Verification: Theory and Practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 605\u2013623. Springer, Heidelberg (2005)"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/3-540-44750-4_6","volume-title":"Advances in Cryptology - CRYPTO 1995","author":"C.H. Lim","year":"1995","unstructured":"Lim, C.H., Lee, P.J.: Security and Performance of Server-Aided RSA Computation Protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 70\u201383. Springer, Heidelberg (1995)"},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/3-540-49264-X_6","volume-title":"Advances in Cryptology - EUROCRYPT 1995","author":"C.H. Lim","year":"1995","unstructured":"Lim, C.H., Lee, P.J.: Server(Prover\/Signer)-Aided Verification of Identity Proofs and Signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 64\u201378. Springer, Heidelberg (1995)"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/0-387-34799-2_35","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"T. Matsumoto","year":"1990","unstructured":"Matsumoto, T., Kato, K., Imai, H.: Speeding up secret computations with insecure auxiliary device. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 497\u2013506. Springer, Heidelberg (1990)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-57220-1_70","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"T. Matsumoto","year":"1993","unstructured":"Matsumoto, T., Imai, H., Laih, C.S., Yen, S.M.: On verifiable implicit asking protocols for RSA computation. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 296\u2013307. Springer, Heidelberg (1993)"},{"key":"29_CR15","unstructured":"Modadugu, N., Boneh, D., Kim, M.: Generating RSA Keys on a Handheld Using an Untrusted Server. In: CT-RSA 2000 (2000), Available at, http:\/\/crypto.stanford.edu\/dabo\/pubs.html"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","volume-title":"Advances in Cryptology - ASIACRYPT 1998","author":"P. Nguyen","year":"1998","unstructured":"Nguyen, P., Stern, J.: The Beguin-Quisquater Server-Aided RSA Protocol from Crypto 1995 is not Secure. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 372\u2013379. Springer, Heidelberg (1998)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-47555-9_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"B. Pfitzmann","year":"1993","unstructured":"Pfitzmann, B., Waidner, M.: Attacks on protocols for server-aided RSA computation. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 153\u2013162. Springer, Heidelberg (1993)"},{"issue":"2","key":"29_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"3","key":"29_CR19","first-page":"1","volume":"1","author":"A. Shamir","year":"1995","unstructured":"Shamir, A.: RSA for Paranoids. CryptoBites\u00a01(3), 1\u20134 (1995)","journal-title":"CryptoBites"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11689522_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:17:58Z","timestamp":1619507878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11689522_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330523","9783540330585"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11689522_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}