{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:41:22Z","timestamp":1725486082596},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414049"},{"type":"electronic","value":"9783540444480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44448-3_26","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T04:22:44Z","timestamp":1181362964000},"page":"346-358","source":"Crossref","is-referenced-by-count":3,"title":["Addition of El Gamal Plaintexts"],"prefix":"10.1007","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,10,27]]},"reference":[{"key":"26_CR1","series-title":"Lect Notes Comput Sci","first-page":"458","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 90","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, \u201cZero-Knowledge Undeniable Signatures,\u201d in Advances in Cryptology-EUROCRYPT\u2019 90, I Damg\u00e5rd, ed., pp. 458\u2013464, Springer-Verlag, 1990. LNCS No. 473."},{"key":"26_CR2","series-title":"Lect Notes Comput Sci","first-page":"212","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"D. Chaum","year":"1989","unstructured":"D. Chaum and H. van Antwerpen, \u201cUndeniable Signatures,\u201d in Advances in Cryptology-CRYPTO\u2019 89, G. Brassard, ed., pp. 212\u2013216, Springer-Verlag, 1989. LNCS No. 435."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith, \u201cFast evaluation of logarithms in fields of characteristic two,\u201d IEEE Transactions of Information Theory, 30 (1984), 587\u2013594.","journal-title":"IEEE Transactions of Information Theory"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,\u201d IEEE Transactions on Information Theory, vol. 31, pp. 469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Yung, \u201cCommunication Complexity of Secure Computation\u201d, in Proc. 24th Annual Symp. on the Theory of Computation (STOC), pp. 699\u2013710, ACM Press, 1992.","DOI":"10.1145\/129712.129780"},{"key":"26_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-48910-X_21","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"R. Gennaro","year":"1999","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, \u201cSecure Distributed Key Generation for Discrete-Log Based Cryptosystems\u201d, in Advances in Cryptology-EUROCRYPT\u2019 99, J. Stern, ed., pp. 295\u2013310, Springer-Verlag, 1999. LNCS No. 1592."},{"key":"26_CR7","unstructured":"R. Gennaro, M. Rabin, and T. Rabin, \u201cSimplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography\u201d, in Proc. 1998 ACM Symposium on Principles of Distributed Computing (PODC), ACM Press, 1999."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and C.-P. Schnorr, \u201cEfficient Oblivious Proofs of Correct Exponentiation,\u201d in Communications and Multimedia Security (CMS)\u2019 99, B. Preneel, ed., pp. 71\u201384, Kluwer Academic Publishers.","DOI":"10.1007\/978-0-387-35568-9_5"},{"key":"26_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/BFb0054145","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"M. Jakobsson","year":"1998","unstructured":"M. Jakobsson, \u201cA Practical Mix,\u201d in Advances in Cryptology-EUROCRYPT\u2019 98, K. Nyberg, ed., pp. 448\u2013461, Springer-Verlag, 1998. LNCS No. 1403."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, \u201cFlash Mixing,\u201d in Proc. 1999 ACM Symposium on Principles of Distributed Computing (PODC), pp. 83\u201389, ACM Press, 1999.","DOI":"10.1145\/301308.301333"},{"key":"26_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology-Crypto\u2019 95","author":"A. Herzberg","year":"1995","unstructured":"A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, \u201cProactive Secret Sharing or How to Cope With Perpetual Leakage,\u201d in Advances in Cryptology-Crypto\u2019 95, D. Coppersmith, ed., pp. 339\u2013352, Springer-Verlag, 1995. LNCS No. 963."},{"key":"26_CR12","unstructured":"K. McCurley, personal communication."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"26_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 91","author":"T.P. Pedersen","year":"1991","unstructured":"T.P. Pedersen, \u201cDistributed Provers with Applications to Undeniable Signatures,\u201d in Advances in Cryptology-EUROCRYPT\u2019 91, D.W. Davies, ed., Springer-Verlag, pp. 221\u2013242, 1991. LNCS No. 547."},{"key":"26_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology-CRYPTO\u2019 91","author":"T.P. Pedersen","year":"1991","unstructured":"T.P. Pedersen, \u201cNon-Interactive and Information-Theoretic Secure Verifiable Secret Sharing,\u201d in Advances in Cryptology-CRYPTO\u2019 91, J. Feigenbaum, ed., pp. 129\u2013140, Springer-Verlag, 1991. LNCS NO. 576."},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.-P. Schnorr","year":"1991","unstructured":"C.-P. Schnorr, \u201cEffcient Signature Generation for Smart Cards,\u201d Journal of Cryptology, vol. 4, pp. 161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to share a secret\u201d, Communications of the ACM, vol. 22, pp. 612\u2013613, 1979.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44448-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T23:13:26Z","timestamp":1556493206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44448-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414049","9783540444480"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-44448-3_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}