{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:53:57Z","timestamp":1766048037093},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_17","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"208-221","source":"Crossref","is-referenced-by-count":38,"title":["Fair Cryptosystems, Revisited"],"prefix":"10.1007","author":[{"given":"Joe","family":"Kilian","sequence":"first","affiliation":[]},{"given":"Tom","family":"Leighton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"4","key":"17_CR1","first-page":"204","volume":"13","author":"T. Beth","year":"1990","unstructured":"T. Beth. Zur diskussion gestellt. Informatik-Spektrum, 13(4):204\u2013215, 1990.","journal-title":"Informatik-Spektrum"},{"key":"17_CR2","first-page":"313","volume":"48","author":"G. Blakley","year":"1979","unstructured":"G. Blakley. Safeguarding cryptographic keys. In AFIPS \u2014 Conference Proceedings, 48:313\u2013317, June 1979.","journal-title":"AFIPS \u2014 Conference Proceedings"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/BF00204448","volume":"2","author":"J. F. Boyar","year":"1990","unstructured":"J. F. Boyar, S. A. Kurtz, and M. W. Krentel. A discrete logarithm implementation of perfect zero-knowledge blobs. Journal of Cryptology, 2(2):63\u201376, 1990.","journal-title":"Journal of Cryptology"},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Modern Cryptology; A Tutorial","author":"G. Brassard","year":"1988","unstructured":"Brassard, G. (1988). Modern Cryptology; A Tutorial. Lecture Notes in Computer Science, No. 325 Springer Verlag."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"G. Brassard, D. Chaum and C. Cr\u00e9pean. Minimum Disclosure Proofs of Knowledge. In JCSS, pages 156\u2013189. 1988.","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. Proceedings of the 26th IEEE Symposium on Foundations of Computer Science, pages 383\u2013395, 1985.","DOI":"10.1109\/SFCS.1985.64"},{"key":"17_CR7","volume-title":"Cryptography and Data Security","author":"D. E. Denning","year":"1982","unstructured":"Denning, D. E. (1982). Cryptography and Data Security. Massachusetts: Addison-Wesley."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Y. Desmedt. Abuses in cryptography and how to fight them. Crypto\u2019 88, pages 375\u2013389, August 1988.","DOI":"10.1007\/0-387-34799-2_29"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. Crypto\u2019 87, pages 21\u201339, August 1987.","DOI":"10.1007\/3-540-48184-2_3"},{"key":"17_CR10","unstructured":"Y. Desmedt and M. Yung. Minimal Cryptosystems and Defining Subliminal Freeness In Symposium on Information Theory, 1994."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"P. Feldman. A practical scheme for non-interactive verifiable secret sharing. Proceedings of the 28th IEEE Symposium on Foundations of Computer Science, pages 427\u2013437, 1987.","DOI":"10.1109\/SFCS.1987.4"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"G. Harper, A. Menezes and S. Vanstone. Public-key Cryptosystems with Very Small Key Lengths. Eurocrypt\u2019 92, pages 163\u2013173, May 1992.","DOI":"10.1007\/3-540-47555-9_14"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Karnin, Greene and Hellman. On secret Sharing Systems, IEEE Transactions on Information Theory, vol. 29, 1983.","DOI":"10.1109\/TIT.1983.1056621"},{"key":"17_CR14","unstructured":"T. Leighton. Failsafe key escrow systems. Technical Memo 483, MIT Lab. for Computer Science, August 1994."},{"key":"17_CR15","unstructured":"T. Leighton and S. Micali. Secret key distribution without public-key cryptography. Crypto\u2019 93, August 1993."},{"key":"17_CR16","unstructured":"S. Micali. Fair public-key cryptosystems. Technical Report 579, MIT Lab. for Computer Science, September 1993."},{"key":"17_CR17","unstructured":"Oren. On the cheating power of cunning verifiers. Proceedings of the 28th FOCS, IEEE, 1987."},{"key":"17_CR18","unstructured":"T. P. Pedersen. Distributed provers with applications to undeniable signatures. Eurocrypt\u2019 91, April 1991."},{"key":"17_CR19","unstructured":"Schneier, B. (1993). Applied Cryptography. John Wiley."},{"issue":"11","key":"17_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22(11):612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. The prisoners\u2019 problem and the subliminal channel. Crypto\u2019 83, pages 51\u201367, August 1983.","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. The subliminal channel and digital signatures. Eurocrypt\u2019 84, pages 364\u2013378, April 1984.","DOI":"10.1007\/3-540-39757-4_25"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"G. Simmons. A secure subliminal channel (?). Crypto\u2019 85, pages 33\u201341, August 1985.","DOI":"10.1007\/3-540-39799-X_5"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. How to really share a secret. Crypto\u2019 90, pages 390\u2013448, August 1990.","DOI":"10.1007\/0-387-34799-2_30"},{"key":"17_CR25","unstructured":"Simmons, G. (1991). Contemporary Cryptology. IEEE Press."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. Subliminal communication is easy using the DSA. Eurocrypt\u2019 93, pages 218\u2013232, May 1993.","DOI":"10.1007\/3-540-48285-7_18"},{"key":"17_CR27","unstructured":"Y. Yacobi. Discrete-log with compressible exponents. Crypto 90, pages 639\u2013643, August 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:18:30Z","timestamp":1556770710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}