{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T03:41:02Z","timestamp":1777520462933,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_16","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"197-207","source":"Crossref","is-referenced-by-count":18,"title":["A Key Escrow System with Warrant Bounds"],"prefix":"10.1007","author":[{"given":"Arjen K.","family":"Lenstra","sequence":"first","affiliation":[]},{"given":"Peter","family":"Winkler","sequence":"additional","affiliation":[]},{"given":"Yacov","family":"Yacobi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"16_CR1","unstructured":"Administrative Office of the United States Courts, 1993, Report on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communications (Wiretap Report), 1993."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"M. Blaze, \u201cProtocol Failure in the Escrowed Encryption Standard,\u201d Proceedings of the 2nd ACM Conference on Computer and Communications Security, November 1994, pp. 59\u201367.","DOI":"10.1145\/191177.191193"},{"key":"16_CR3","unstructured":"E. Brickell, D. Denning, S. Kent, D. Maher, and W. Tuchman, \u201cSKIPJACK Review: Interim Report, The SKIPJACK Algorithm,\u201d July 28, 1993, available electronically from cpsr.org."},{"key":"16_CR4","unstructured":"Department of Justice Briefing re Escrowed Encryption Standard, Department of Commerce, February 4 1994, Washington, DC."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, \u201cHow to Share a Function Securely,\u201d Proc. STOC\u201994, 1994, pp. 522\u2013533.","DOI":"10.1145\/195058.195405"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"S. Even, A. Selman, and Y. Yacobi, \u201cThe Complexity of Promise Problems with Applications to Public Key Cryptography,\u201d Information and Control, Vol. 61, No. 2, May 1984.","DOI":"10.1016\/S0019-9958(84)80056-X"},{"key":"16_CR7","unstructured":"J. Kilian and T. Leighton, \u201cFailsafe Key Escrow,\u201d presented at Rump Crypto\u201994."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"B. Lloyd, W. Simpson, \u201cPPP authentications protocols\u201d, Internet Request for Comments 1334 (1992).","DOI":"10.17487\/rfc1334"},{"key":"16_CR9","unstructured":"S. Micali, \u201cFair public key cryptosystems,\u201d Proc. Crypto\u201992."},{"key":"16_CR10","unstructured":"National Institute of Standards and Technology, Federal Information Processing Standards Publication 185, Escrowed Encryption Standard, February 9 1994, Washington, DC."},{"key":"16_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Proc. Eurocrypt\u201991","author":"T.P. Pedersen","year":"1991","unstructured":"T.P. Pedersen, \u201cDistributed provers with application to undeniable signatures,\u201d Proc. Eurocrypt\u201991, Springer-Verlag LNCS 547, pp 221\u2013238."},{"issue":"7","key":"16_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/129902.129905","volume":"35","author":"R. Rivest","year":"1992","unstructured":"R. Rivest, \u201cResponses to NIST\u2019s Proposal,\u201d Communications of the ACM, Vol. 35(7), July 1992, pp. 41\u201347.","journal-title":"Communications of the ACM"},{"key":"16_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-38424-3_19","volume-title":"Proc. Crypto\u201990","author":"Y. Yacobi","year":"1991","unstructured":"Y. Yacobi, \u201cA key distribution \u201cparadox\u201d,\u201d Proc. Crypto\u201990, Springer-Verlag LNCS 537, 1991, pp. 268\u2013273."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:18:41Z","timestamp":1556756321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}