{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:13:52Z","timestamp":1758845632213},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_19","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"268-273","source":"Crossref","is-referenced-by-count":20,"title":["A Key Distribution \u201cParadox\u201d"],"prefix":"10.1007","author":[{"given":"Yacov","family":"Yacobi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ben-David, S., Chor, B., Goldreich, O., Luby, M.: \u201cOn the Theory of Average Case Complexity,\u201d STOC, 1989, pp. 204\u2013216.","DOI":"10.1145\/73007.73027"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Micali, S.: \u201cHow to Sign Given Any Trap-Door Function\u201d, STOC, 1988, pp. 32\u201334.","DOI":"10.1145\/62212.62216"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Dolev, D., Even, S., Karp, R.: \u201cOn the Security of Ping-Pong Protocols,\u201d Advances in Cryptology: Proc. of Crypto\u201982, Plenum Press, pp. 177\u2013186, 1983.","DOI":"10.1007\/978-1-4757-0602-4_16"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: \u201cNew Directions In Cryptography,\u201d IEEE Trans. on Inf. Theory, 1976, IT-22, pp. 644\u2013654.","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: \u201cA Digital Signature Scheme Secure Against Chosen Message Attacks,\u201d SIAM J. On Comput., Vol. 17, No. 2, 1988, pp. 281\u2013308.","journal-title":"SIAM J. On Comput."},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"2","author":"K.S. McCurley","year":"1988","unstructured":"McCurley, K.S.: \u201cA Key Distribution System Equivalent to Factoring,\u201d J. of Cryptology, Vol. 1, No. 2, 1988, pp. 95\u2013106.","journal-title":"J. of Cryptology"},{"key":"19_CR7","first-page":"99","volume":"E69","author":"T. Matsumoto","year":"1986","unstructured":"Matsumoto, T., Takashima, Y., Imai, H.: \u201cOn Seeking Smart Public-Key-Distribution Systems,\u201d The Transactions of the IECE of Japan, Vol. E69, No. 2, February 1986, pp. 99\u2013106.","journal-title":"The Transactions of the IECE of Japan"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: \u201cUniversal One-Way Hash Functions and their Cryptographic Applications,\u201d STOC, 1989, pp. 33\u201343, 1989.","DOI":"10.1145\/73007.73011"},{"key":"19_CR9","unstructured":"Naor, M., Yung, M.: \u201cPublic-Key cryptosystems provably secure against chosen ciphertext attacks,\u201d to appear."},{"key":"19_CR10","unstructured":"Rabin, M.O.: \u201cDigital Signature and Public Key Functions as Intractable as Factoring,\u201d Technical Memo TM-212, Lab for Computer Science, MIT, 1979."},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., and Adelman, L.: \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Commun. ACM 1978, 21, pp. 120\u2013126.","journal-title":"Commun. ACM"},{"key":"19_CR12","unstructured":"Shmuely, Z.: \u201cComposite Diffie-Hellman Public-Key Generating Systems Are Hard to Break,\u201d TR. No. 356, Computer Science Dept. Technion, IIT, Feb. 1985."},{"key":"19_CR13","unstructured":"Yacobi, Y., Shmuely, Z.: \u201cOn Key Distribution Systems,\u201d Proc. Crypto\u201989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:07Z","timestamp":1619572807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_19","relation":{},"subject":[]}}