{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:03:44Z","timestamp":1778789024041,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_20","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:28:14Z","timestamp":1194964094000},"page":"332-354","source":"Crossref","is-referenced-by-count":115,"title":["Forward-Secure Signatures with Optimal Signing and Verifying"],"prefix":"10.1007","author":[{"given":"Gene","family":"Itkis","sequence":"first","affiliation":[]},{"given":"Leonid","family":"Reyzin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"20_CR1","unstructured":"Ross Anderson. Invited lecture. Fourth Annual Conference on Computer and Communications Security, ACM, 1997."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Michel Abdalla and Leonid Reyzin. A new forward-secure digital signature scheme. In Advances in Cryptology\u2014ASIACRYPT 2000, Springer-Verlag 2000. Full version available from the Cryptology ePrint Archive, record 2000\/002, http:\/\/eprint.iacr.org\/ .","DOI":"10.1007\/3-540-44448-3_10"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Sara Miner. A forward-secure digital signature scheme. In Advances in Cryptology\u2014CRYPTO\u2019 99, Springer-Verlag, 1999. Revised version is available from http:\/\/www.cs.ucsd.edu\/mihir\/ .","DOI":"10.1007\/3-540-48405-1_28"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Niko Bari\u0107 and Birgit Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology\u2014 EUROCRYPT 97, Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_33"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 62\u201373, November 1993. Revised version appears in http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/crypto-papers.html .","DOI":"10.1145\/168588.168596"},{"key":"20_CR6","unstructured":"Eric Bach and Jeffrey Shallit. Algorithmic Number Theory. MIT Press, Cambridge, MA, 1996."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 97","author":"E. Fujisaki","year":"1997","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Burton S. Kaliski Jr., editor, Advances in Cryptology\u2014CRYPTO\u2019 97, volume 1294 of Lecture Notes in Computer Science, pages 16\u201330. Springer-Verlag, 17\u201321 August 1997."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, Advances in Cryptology\u2014CRYPTO\u2019 86, volume 263 of Lecture Notes in Computer Science, pages 186\u2013194. Springer-Verlag, 1987, 11\u201315 August 1986."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281\u2013308, April 1988.","DOI":"10.1137\/0217017"},{"key":"20_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 88","year":"1990","unstructured":"Shafi Goldwasser, editor. Advances in Cryptology\u2014CRYPTO\u2019 88, volume 403 of Lecture Notes in Computer Science. Springer-Verlag, 1990, 21\u201325 August 1988."},{"key":"20_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 88","author":"L. C. Guillou","year":"1990","unstructured":"Louis Claude Guillou and Jean-Jacques Quisquater. A \u201cparadoxical\u201d indentity-based signature scheme resulting from zero-knowledge. In Gold-wasser [Gol88], pages 216\u2013231."},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk. Simple forward-secure signatures from any signature scheme. In Seventh ACM Conference on Computer and Communication Security. ACM, November 1\u20134 2000.","DOI":"10.1145\/352600.352617"},{"key":"20_CR13","unstructured":"Silvio Micali and Gene Itkis. Private Communication."},{"key":"20_CR14","volume-title":"Technical Report MIT\/LCS\/TM-501","author":"S. Micali","year":"1994","unstructured":"Silvio Micali. A secure and efficient digital signature algorithm. Technical Report MIT\/LCS\/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994."},{"key":"20_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/3-540-46701-7_15","volume-title":"Secure Networking \u2014 CQRE [Secure]\u2019 99","author":"S. Micali","year":"1999","unstructured":"Silvio Micali and Leonid Reyzin. Improving the exact security of Fiat-Shamir signature schemes. In R. Baumgart, editor, Secure Networking \u2014 CQRE [Secure]\u2019 99, volume 1740 of Lecture Notes in Computer Science, pages 167\u2013182. Springer-Verlag, 1999."},{"key":"20_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/0-387-34799-2_17","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 88","author":"K. Ohta","year":"1990","unstructured":"Kazuo Ohta and Tatsuaki Okamoto. A modification of the Fiat-Shamir scheme. In Goldwasser [Gol88], pages 232\u2013243."},{"key":"20_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/3-540-46877-3_38","volume-title":"Advances in Cryptology\u2014 EUROCRYPT 90","author":"H. Ong","year":"1991","unstructured":"H. Ong and Claus P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In I. B. Damg\u00e5rd, editor, Advances in Cryptology\u2014 EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science, pages 432\u2013440. Springer-Verlag, 1991, 21\u201324 May 1990."},{"key":"20_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology\u2014EUROCRYPT 96","author":"D. Pointcheval","year":"1996","unstructured":"David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Ueli Maurer, editor, Advances in Cryptology\u2014EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 387\u2013398. Springer-Verlag, 12\u201316 May 1996."},{"issue":"1","key":"20_CR19","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/357353.357357","volume":"1","author":"Adi Shamir","year":"1983","unstructured":"Adi Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1(1):38\u201344, February 1983.","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:22:37Z","timestamp":1556950957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}