{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:22Z","timestamp":1725490522725},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_22","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"292-307","source":"Crossref","is-referenced-by-count":2,"title":["Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization"],"prefix":"10.1007","author":[{"given":"Rei","family":"Safavi-Naini","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology-Eurocrypt\u2019 97","author":"N. Bari\u0107","year":"1997","unstructured":"N. Bari\u0107 and B. Pfitzmann. Collision-Free Accumulators and Fail-Stop Signature Schemes without Trees. Advances in Cryptology-Eurocrypt\u2019 97, Lecture Notes in Computer Science 1233, pages 480\u2013494, 1997."},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"Advances in Cryptology-Crypto\u2019 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh and M. Franklin. Efficient generation of shared RSA keys. Advances in Cryptology-Crypto\u2019 97, Lecture Notes in Computer Science 1294, pages 425\u2013439, 1997."},{"key":"22_CR3","unstructured":"C. Boyd. Digital multisignatures. Cryptography and Coding, ed. H. Beker and F. Piper, Clarendon Press, Oxford, pages 241\u2013246, 1989."},{"key":"22_CR4","unstructured":"D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. Interner Bericht, Fakult\u00e4t f\u00fcr Informatik, 1\/91, 1990."},{"key":"22_CR5","unstructured":"R. Croft and S. Harris. Public-key cryptography and reusable shared secrets. Cryptography and Coding, pages 189\u2013201, 1989."},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","first-page":"120","volume-title":"Advances in Cryptology-Crypto\u2019 87","author":"Y. Desmedt","year":"1987","unstructured":"Y. Desmedt. Society and group oriented cryptography: A new concept. Advances in Cryptology-Crypto\u2019 87, Lecture Notes in Computer Science 293, pages 120\u2013127, 1987."},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography. IEEE IT, 22:644\u2013654, 1976.","journal-title":"IEEE IT"},{"key":"22_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/3-540-48405-1_8","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"N. Gilboa","year":"1999","unstructured":"N. Gilboa. Two party RSA key generation. Advances in Cryptology-Crypto\u2019 99, Lecture Notes in Computer Science, pages 116\u2013129, 1999."},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","first-page":"63","volume-title":"Advances in Cryptology-Eurocrypt\u2019 90","author":"M. Girault","year":"1991","unstructured":"M. Girault. An Identity-based Identification Scheme based on Discrete Logarithms modulo a Composite Number. Advances in Cryptology-Eurocrypt\u2019 90, Lecture Notes in Computer Science 437, pages 63\u201371, 1991."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1998","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17:281\u2013308, 1998.","journal-title":"SIAM Journal of Computing"},{"issue":"5","key":"22_CR11","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech., 141(5):307\u2013313, September 1994.","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"22_CR12","unstructured":"L. Lamport. Constructing digital signatures from a one-way function. PSRI International CSL-98, 1979."},{"key":"22_CR13","first-page":"3","volume":"3","author":"A. Lenstra","year":"1999","unstructured":"A. Lenstra and E. Verheul. Selecting cryptographic key sizes. online: http:\/\/www.cryptosavvy.com\/ . Extended abstract appeared in Commercial Applications, Price Waterhouse Coopers, CCE Quarterly Journals, 3:3\u20139, 1999.","journal-title":"Price Waterhouse Coopers, CCE Quarterly Journals"},{"issue":"2","key":"22_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1137\/S009753979324557X","volume":"26","author":"T. P. Pedersen","year":"1997","unstructured":"T. P. Pedersen and B. Pfitzmann. Fail-stop signatures. SIAM Journal on Computing, 26\/2:291\u2013330, 1997.","journal-title":"SIAM Journal on Computing"},{"key":"22_CR15","unstructured":"B. Pfitzmann. Fail-stop signatures: Principles and applications. Proc. Compsec\u2019 91, 8th world conference on computer security, audit and control, pages 125\u2013134, 1991."},{"key":"22_CR16","unstructured":"B. Pfitzmann. Fail-stop signatures without trees. Hildesheimer Informatik-Berichte, Institut f\u00fcr Informatik, 16\/94, 1994."},{"key":"22_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0024619","volume-title":"Digital Signature Schemes-General Framework and Fail-Stop Signatures","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann. Digital Signature Schemes-General Framework and Fail-Stop Signatures. Lecture Notes in Computer Science 1100, Springer-Verlag, 1996."},{"key":"22_CR18","unstructured":"B. Pfitzmann and M. Waidner. Formal aspects of fail-stop signatures. Interner Bericht, Fakult\u00e4t f\u00fcr Informatik, 22\/90, 1990."},{"key":"22_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-48970-3_9","volume-title":"Information Security and Privacy, ACISP\u2019 99","author":"W. Susilo","year":"1999","unstructured":"W. Susilo, R. Safavi-Naini, and J. Pieprzyk. Fail-stop threshold signature schemes based on elliptic curve. Information Security and Privacy, ACISP\u2019 99, Lecture Notes in Computer Science 1587, pages 103\u2013116, 1999."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"E. van Heijst and T. Pedersen. How to make efficient fail-stop signatures. Advances in Cryptology-Eurocrypt\u2019 92, pages 337\u2013346, 1992.","DOI":"10.1007\/3-540-47555-9_30"},{"key":"22_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-48071-4_2","volume-title":"Advances in Cryptology-Crypto\u2019 92","author":"E. Heijst van","year":"1993","unstructured":"E. van Heijst, T. Pedersen, and B. Pfitzmann. New constructions of fail-stop signatures and lower bounds. Advances in Cryptology-Crypto\u2019 92, Lecture Notes in Computer Science 740, pages 15\u201330, 1993."},{"key":"22_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Eurocrypt\u2019 89","author":"M. Waidner","year":"1990","unstructured":"M. Waidner and B. Pfitzmann. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. Advances in Cryptology-Eurocrypt\u2019 89, Lecture Notes in Computer Science 434, 1990."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:05:21Z","timestamp":1556816721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}