{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:35Z","timestamp":1725496655355},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_13","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"177-188","source":"Crossref","is-referenced-by-count":16,"title":["Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected against Arbiter\u2019s Attacks"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-45961-8_5","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u2019 88","author":"E. F. Brickell","year":"1988","unstructured":"E. F. Brickell and D. R. Stinson. Authentication codes with multiple arbiters. In C. G. G\u00fcnther, editor, Advances in Cryptology, Proc. of Eurocrypt\u2019 88 (Lecture Notes in Computer Science 330), pp. 51\u201355. Springer-Verlag, May 1988. Davos, Switzerland."},{"key":"13_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-39799-X_3","volume-title":"Advances in Cryptology. Proc. of Crypto\u201985","author":"W. Jonge de","year":"1986","unstructured":"W. de Jonge and D. Chaum. Attacks on some RSA signatures. In Advances in Cryptology. Proc. of Crypto\u201985 (Lecture Notes in Computer Science 218), pp. 18\u201327. Springer-Verlag, New York, 1986. Santa Barbara, California, U.S.A., August 18\u201322, 1985."},{"key":"13_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-47721-7_4","volume-title":"Advances in Cryptology, Proc. of Crypto\u201986","author":"W. Jonge de","year":"1987","unstructured":"W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u201986 (Lecture Notes in Computer Science 263), pp. 49\u201359. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11\u201315."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D. E. R. Denning","year":"1984","unstructured":"D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388\u2013392, 1984.","journal-title":"Comm. ACM"},{"key":"13_CR5","unstructured":"Y. Desmedt and M. Yung. Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter\u2019s attacks. Full paper, available from authors, 1990."},{"issue":"6","key":"13_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6), pp. 644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. Gilbert","year":"1974","unstructured":"E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3), pp. 405\u2013424, March 1974.","journal-title":"The BELL System Technical Journal"},{"issue":"2","key":"13_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281\u2013308, April 1988.","journal-title":"Siam J. Comput."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th Annual Symp. on Foundations of Computer Science (FOCS), pp. 230\u2013235. IEEE Computer Society Press, October 30\u2013November 1, 1989. Research Triangle Park, NC, U.S.A.","DOI":"10.1109\/SFCS.1989.63483"},{"key":"13_CR10","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"C. H. Meyer","year":"1982","unstructured":"C. H. Meyer and S. M. Matyas. Cryptography: A New Dimension in Computer Data Security. J. Wiley, New York, 1982."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of the twenty first annual ACM Symp. Theory of Computing, STOC, pp. 33\u201343, May 15\u201317, 1989.","DOI":"10.1145\/73007.73011"},{"key":"13_CR12","unstructured":"M. Rabin. How to exchange secrets by oblivious transfer. Technical Memo TR-81, Havard Center for Research in Computer Technology, 1981."},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, pp. 294\u2013299, April 1978.","journal-title":"Commun. ACM"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the twenty second annual ACM Symp. Theory of Computing, STOC, pp. 387\u2013394, May 14\u201316, 1990.","DOI":"10.1145\/100216.100269"},{"key":"13_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/3-540-39118-5_15","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 87","author":"G. J. Simmons","year":"1988","unstructured":"G. J. Simmons. Message authentication with arbitration of transmitter\/receiver disputes. In D. Chaum and W. L. Price, editors, Advances in Cryptology \u2014 Eurocrypt\u2019 87 (Lecture Notes in Computer Science 304), pp. 151\u2013165. Springer-Verlag, Berlin, 1988. Amsterdam, The Netherlands, April 13\u201315, 1987, full paper submitted to the Journal of Cryptology."},{"issue":"5","key":"13_CR16","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"G. J. Simmons","year":"1988","unstructured":"G. J. Simmons. A survey of information authentication. Proc. IEEE, 76(5), pp. 603\u2013620, May 1988.","journal-title":"Proc. IEEE"},{"key":"13_CR17","first-page":"215","volume":"68","author":"G. J. Simmons","year":"1989","unstructured":"G. J. Simmons. Robust shared secret schemes. Congressus Numerantium, 68, pp. 215\u2013248, 1989.","journal-title":"Congressus Numerantium"},{"issue":"2","key":"13_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G. J. Simmons","year":"1990","unstructured":"G. J. Simmons. A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. Journal of Cryptology, 2(2), pp. 77\u2013104, 1990.","journal-title":"Journal of Cryptology"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22, pp. 265\u2013279, 1981.","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:06Z","timestamp":1619572806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_13","relation":{},"subject":[]}}