{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:54:39Z","timestamp":1761292479798},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_15","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T08:05:56Z","timestamp":1196669156000},"page":"206-214","source":"Crossref","is-referenced-by-count":29,"title":["Unconditionally-Secure Digital Signatures"],"prefix":"10.1007","author":[{"given":"David","family":"Chaum","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Roijakkers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"J. Bos, B. den Boer: \u201cDetection of Disrupters in the DC Protocol\u201d, Advances in Cryptology-EUROCRYPT\u2019 89 Proceedings, 1989.","DOI":"10.1007\/3-540-46885-4_33"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"G. Bleumer, B. Pfitzmann, M. Waidner: \u201cA remark on a signature scheme where forgery can be proved\u201d, to appear in Advances in Cryptology-EUROCRYPT\u2019 90 Proceedings, 1990.","DOI":"10.1007\/3-540-46877-3_39"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"D. Chaum: \u201cThe Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability\u201d, Journal of Cryptology 1\/1, 1988.","DOI":"10.1007\/BF00206326"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"W. Diffie, M.E. Hellman: \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory IT-22, 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms\u201d, IEEE Transactions on Information Theory IT-31, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"15_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Crypto 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat, A. Shamir: \u201cHow To Prove Yourself: Practical Solutions to Identification and Signature Problems\u201d, Proceedings of Crypto 86, Lecture Notes in Computer Science, Vol. 263, Berlin: Springer \u2014 Verlag, 1987."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"A. Pfitzmann: \u201cDiensteintegrierende Kommunikationsnetze mit Teilnember-\u00fcberpr\u00fcfbarem Datenschutz\u201d, Dissertation Universit\u00e4t Karlsruhe, Fakult\u00e4t f\u00fcr Informatik, 1989.","DOI":"10.1007\/978-3-642-75544-6"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. Proceedings, 21th Annual ACM Symposium on the Theory of Computing, 1989.","DOI":"10.1145\/73007.73014"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, A. Shamir, L. Adleman, \u201cA Method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, vol. 21, 1978.","DOI":"10.21236\/ADA606588"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:20:07Z","timestamp":1619558407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_15","relation":{},"subject":[]}}