{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T04:52:44Z","timestamp":1778215964501,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_8","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:28:14Z","timestamp":1194964094000},"page":"137-154","source":"Crossref","is-referenced-by-count":54,"title":["Two-Party Generation of DSA Signatures"],"prefix":"10.1007","author":[{"given":"Philip","family":"MacKenzie","sequence":"first","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"8_CR1","unstructured":"J. Benaloh. Dense probabilistic encryption. In Workshop on Selected Areas of Cryptography, pages 120\u2013128, 1994."},{"key":"8_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"EUROCRYPT\u2019 96","author":"N. Bari\u0107","year":"1997","unstructured":"N. Bari\u0107 and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In EUROCRYPT\u2019 96 (LNCS 1233), pages 480\u2013494, 1997."},{"issue":"6","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"M. Blum","year":"1991","unstructured":"M. Blum, A. DeSantis, S. Micali, and G. Persiano. Noninteractive zero-knowledge. SIAM Journal of Computing 20(6):1084\u20131118, 1991.","journal-title":"SIAM Journal of Computing"},{"key":"8_CR4","unstructured":"C. Boyd. Digital multisignatures. In H. J. Beker and F. C. Piper, editors, Cryptography and Coding, pages 241\u2013246. Clarendon Press, 1986."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, pages 62\u201373, November 1993.","DOI":"10.1145\/168588.168596"},{"key":"8_CR6","unstructured":"R. A. Croft and S. P. Harris. Public-key cryptography and reusable shared secrets. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 189\u2013201, 1989."},{"issue":"4","key":"8_CR7","first-page":"532","volume":"E76A","author":"M. Cerecedo","year":"1993","unstructured":"M. Cerecedo, T. Matsumoto, H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEICE Trans. Fundamentals of Electronics Communications and Computer Sciences E76A(4):532\u2013545, April 1993.","journal-title":"IEICE Trans. Fundamentals of Electronics Communications and Computer Sciences"},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","first-page":"120","volume-title":"CRYPTO\u2019 87","author":"Y. Desmedt","year":"1987","unstructured":"Y. Desmedt. Society and group oriented cryptography: a new concept. In CRYPTO\u2019 87 (LNCS 293), pages 120\u2013127, 1987."},{"key":"8_CR9","series-title":"Lect Notes Comput Sci","first-page":"307","volume-title":"CRYPTO\u2019 89","author":"Y. Desmedt","year":"1989","unstructured":"Y. Desmedt and Y. Frankel. Threshold cryptosystems. In CRYPTO\u2019 89 (LNCS 435), pages 307\u2013315, 1989."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR11","volume-title":"Secure hash standard","author":"FIPS 180-1.","year":"1995","unstructured":"FIPS 180-1. Secure hash standard. Federal Information Processing Standards Publication 180-1, U.S. Dept. of Commerce\/NIST, National Technical Information Service, Springfield, Virginia, 1995."},{"key":"8_CR12","volume-title":"Digital signature standard","author":"FIPS 186.","year":"1994","unstructured":"FIPS 186. Digital signature standard. Federal Information Processing Standards Publication 186, U.S. Dept. of Commerce\/NIST, National Technical Information Service, Springfield, Virginia, 1994."},{"key":"8_CR13","series-title":"Lect Notes Comput Sci","first-page":"56","volume-title":"EUROCRYPT\u2019 89","author":"Y. Frankel","year":"1989","unstructured":"Y. Frankel. A practical protocol for large group oriented networks. In EUROCRYPT\u2019 89 (LNCS 434), pages 56\u201361, 1989."},{"key":"8_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/3-540-48481-7_2","volume-title":"European Symposium on Algorithms","author":"Y. Frankel","year":"1999","unstructured":"Y. Frankel, P. MacKenzie, and M. Yung. Adaptively-secure distributed threshold public key systems. In European Symposium on Algorithms (LNCS 1643), pages 4\u201327, 1999."},{"key":"8_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"CRYPTO\u2019 97","author":"E. Fujisaki","year":"1997","unstructured":"E. Fujisaki and T. Okamoto. Statistical zero-knowledge protocols to prove modular polynomial relations. In CRYPTO\u2019 97 (LNCS 1294), pages 16\u201330, 1997."},{"key":"8_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-68339-9_31","volume-title":"EUROCRYPT\u2019 96","author":"R. Gennaro","year":"1996","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In EUROCRYPT\u2019 96 (LNCS 1070), pages 354\u2013371, 1996."},{"key":"8_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-48910-X_21","volume-title":"EUROCRYPT\u2019 99","author":"R. Gennaro","year":"1999","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In EUROCRYPT\u2019 99 (LNCS 1592), pages 295\u2013310, 1999."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"8_CR19","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"issue":"5","key":"8_CR20","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"L. Harn. Group oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech. 141(5):307\u2013313, 1994.","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive public-key and signature schemes. In 4th ACM Conference on Computer and Communications Security, pages 100\u2013110, 1997.","DOI":"10.1145\/266420.266442"},{"key":"8_CR22","series-title":"Lect Notes Comput Sci","first-page":"352","volume-title":"EUROCRYPT\u2019 90","author":"T. Hwang","year":"1990","unstructured":"T. Hwang. Cryptosystem for group oriented cryptography. In EUROCRYPT\u2019 90 (LNCS 473), pages 352\u2013360, 1990."},{"key":"8_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-45539-6_16","volume-title":"EUROCRYPT 2000","author":"S. Jarecki","year":"2000","unstructured":"S. Jarecki and A. Lysyanskaya. Adaptively secure threshold cryptography: introducing concurrency, removing erasures. In EUROCRYPT 2000 (LNCS 1807), pages 221\u2013242, 2000."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero knowledge on the internet. In 39th IEEE Symposium on Foundations of Computer Science, pages 484\u2013492, 1998.","DOI":"10.1109\/SFCS.1998.743499"},{"key":"8_CR25","unstructured":"D. W. Kravitz. Digital signature algorithm. U.S. Patent 5,231,668, 27 July 1993."},{"key":"8_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/3-540-44750-4_32","volume-title":"CRYPTO\u2019 95","author":"S. Langford","year":"1995","unstructured":"S. Langford. Threshold DSS signatures without a trusted party. In CRYPTO\u2019 95 (LNCS 963), pages 397\u2013409, 1995."},{"key":"8_CR27","unstructured":"P. MacKenzie and M. K. Reiter. Networked cryptographic devices resilient to capture. DIMACS Technical Report 2001-19, May 2001. Extended abstract in 2001 IEEE Symposium on Security and Privacy, May 2001."},{"key":"8_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/3-540-69053-0_3","volume-title":"EUROCRYPT\u2019 97","author":"D. Naccache","year":"1997","unstructured":"D. Naccache and J. Stern. A new public-key cryptosystem. In EUROCRYPT\u2019 97 (LNCS 1233), pages 27\u201336, 1997."},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In 22nd ACM Symposium on Theory of Computing, pages 427\u2013437, 1990.","DOI":"10.1145\/100216.100273"},{"key":"8_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"EUROCRYPT\u2019 98","author":"T. Okamoto","year":"1998","unstructured":"T. Okamoto and S. Uchiyama. A new public-key cryptosystem, as secure as factoring. In EUROCRYPT\u2019 98 (LNCS 1403), pages 308\u2013318, 1998."},{"key":"8_CR31","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"EUROCRYPT\u2019 99","author":"P. Paillier","year":"1999","unstructured":"P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT\u2019 99 (LNCS 1592), pages 223\u2013238, 1999."},{"issue":"1","key":"8_CR32","first-page":"86","volume":"E79A","author":"C. Park","year":"1996","unstructured":"C. Park and K. Kurosawa. New ElGamal type threshold digital signature scheme. IEICE Trans. Fundamentals of Electronics Communications and Computer Sciences E79A(1):86\u201393, January, 1996.","journal-title":"IEICE Trans. Fundamentals of Electronics Communications and Computer Sciences"},{"key":"8_CR33","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"EUROCRYPT\u2019 91","author":"T. Pedersen","year":"1991","unstructured":"T. Pedersen. A threshold cryptosystem without a trusted party. In EUROCRYPT\u2019 91 (LNCS547), pages 522\u2013526, 1991."},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"A. Yao. Protocols for secure computation. In 23rd IEEE Symposium on Foundations of Computer Science, pages 160\u2013164, 1982.","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:22:08Z","timestamp":1556950928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}