{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:57:10Z","timestamp":1725487030465},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_11","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T15:21:45Z","timestamp":1183389705000},"page":"122-134","source":"Crossref","is-referenced-by-count":1,"title":["Towards Logically and Physically Secure Public-Key Infrastructures"],"prefix":"10.1007","author":[{"given":"Kapali","family":"Viswanathan","sequence":"first","affiliation":[]},{"given":"Ashutosh","family":"Saxena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"11_CR1","first-page":"241","volume-title":"Cryptography and Coding-1986","author":"C. Boyd","year":"1989","unstructured":"Colin Boyd. Digital multisignatures. In Henry J. Beker and F.C. Piper, editors, Cryptography and Coding-1986, Oxford Science Publications, pages 241\u2013246. Clarendon Press, Oxford, 1989."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/BFb0053427","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"D. Chaum","year":"1994","unstructured":"David Chaum. Designated con.rmer signatures. In Alfredo De Santis, editor, Advances in Cryptology-EUROCRYPT\u201994, volume 950 of LNCS, pages 86\u201391. Springer-Verlag, 1994."},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1998","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM journal of computing, 17(2):281\u2013308, April 1998.","journal-title":"SIAM journal of computing"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Patrick Horster, Markus Michels, and Holger Petersen. Meta-multisignature schemes based on the discrete logarithm problem. Technical Report TR-94-12-F, Department of Computer Science, University of Technology Chemnitz-Zwickau, September 1994.","DOI":"10.1007\/BFb0000437"},{"key":"11_CR5","unstructured":"Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures: Delegation of the power to sign messages. In IEICE Trans. Fundamentals, volume E79-A, September 1996."},{"issue":"1","key":"11_CR6","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3233\/JCS-1996-4104","volume":"4","author":"U. M. Maurer","year":"1996","unstructured":"Ueli M. Maurer and Pierre E. Schmid. A calculus for security bootstrapping in distributed systems. Journal of Computer Security, 4(1):55\u201380, 1996.","journal-title":"Journal of Computer Security"},{"key":"11_CR7","unstructured":"National Institute of Standards and Technology, Federal Information Process. Standard FIPS Pub 186: Digital Signature Standard (DSS), 1991."},{"key":"11_CR8","unstructured":"NIST, National Institute of Standards and Technology, Gov. of the USA. Security Requirements for Cryptgraphic Modules, FIPS 140-1, January 1994."},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, 1978.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T20:27:34Z","timestamp":1683923254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}