{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:14:23Z","timestamp":1725488063249},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006466"},{"type":"electronic","value":"9783540365044"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36504-4_16","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T14:48:45Z","timestamp":1184942925000},"page":"220-237","source":"Crossref","is-referenced-by-count":3,"title":["Split-and-Delegate: Threshold Cryptography for the Masses"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Daniel E.","family":"Geer","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"B. Barak, A. Herzberg, D. Naor and E. Shai. The Proactive Security Toolkit and Applications. ACM CCS\u2019 99."},{"key":"16_CR2","unstructured":"D. Boneh, X. Ding, G. Tsudik and M. Wong. A Method for Fast Revocation of Public-Key Certificates and Security Capabilities. 10th Usenix\u2019 01."},{"key":"16_CR3","unstructured":"C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, eds., Cryptography and Coding, Clarendon Press, 1989."},{"key":"16_CR4","unstructured":"R. Cramer, R. Gennaro and B. Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. Eurocrypt\u2019 97."},{"key":"16_CR5","unstructured":"D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM Feb\u2019 81."},{"key":"16_CR6","unstructured":"A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to Share a Function Securely. STOC\u2019 94."},{"key":"16_CR7","unstructured":"Y. Desmedt. Society and Group-Oriented Cryptography: A New Concept. Crypto\u2019 87."},{"key":"16_CR8","unstructured":"Y. Desmedt and Y. Frankel. Threshold Cryptosystems. Crypto\u2019 89."},{"key":"16_CR9","unstructured":"Y. Desmedt and Y. Frankel. Shared Generation of Authenticators and Signatures. Crypto\u2019 91."},{"key":"16_CR10","unstructured":"Y. Desmedt and S. Jajodia. Redistributing Secret Shares to New Access Structures and Its Applications, manuscript."},{"key":"16_CR11","unstructured":"C. Ellison, B. Prantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen. SPKI Certificate Theory. Internet Network Working Group RFC 2693, Sep.\u2019 99."},{"key":"16_CR12","unstructured":"Y. Frankel. A Practical Protocol for Large Group-Oriented Networks. Eurocrypt\u2019 89."},{"key":"16_CR13","unstructured":"Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. Crypto\u2019 97."},{"key":"16_CR14","unstructured":"Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal-Resilience Proactive Public-Key Cryptography. FOCS\u2019 97."},{"key":"16_CR15","unstructured":"Y. Frankel and M. Yung. \u201cDynamic Fault\u201d-Robust Cryptosystems Meet Organizational Needs for Dynamic Control. Financial Cryptography\u2019 99."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"S. Garfinkel, PGP: Pretty Good Privacy. O\u2019Reilly, 1994.","DOI":"10.1016\/0142-0496(94)90185-6"},{"key":"16_CR17","unstructured":"A. Herzberg, M. Jakobsson, S, Jarecki, H. Krawczyk, and M. Yung. Proactive Public Key and Signature Systems. CCS\u2019 97."},{"key":"16_CR18","unstructured":"M. Jakobsson. On Quorum Controlled Asymmetric Proxy Re-encryption, PKC\u2019 99."},{"key":"16_CR19","unstructured":"M. Jakobsson and M. Yung. Magic-ink signatures, Eurocrypt\u2019 97."},{"key":"16_CR20","unstructured":"L. Lessig. Code: And Other Laws of Cyberspace. Basic Books, 2000."},{"key":"16_CR21","unstructured":"M. Mambo, K Usuda and E. Okamoto. Proxy Signatures for Delegated Signing Operation. ACM CCS\u2019 96."},{"key":"16_CR22","unstructured":"R. Ostrovsky and M. Yung. How to Withstand Mobile Virus Attacks. PODC\u2019 91."},{"key":"16_CR23","unstructured":"SET Secure Electronic Transaction Specification, Book 3 Protocol Definition, v1.0\u2019 97. \n                  http:\/\/www.setco.org\/download\/set_bk3.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36504-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T15:38:32Z","timestamp":1580312312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36504-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006466","9783540365044"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36504-4_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}