{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:38:58Z","timestamp":1725489538915},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_24","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"297-310","source":"Crossref","is-referenced-by-count":27,"title":["Secure Signature Schemes based on Interactive Protocols"],"prefix":"10.1007","author":[{"given":"Ronald","family":"Cramer","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Damg\u00e5rd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"24_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of Crypto 88","author":"M. Abadi","year":"1988","unstructured":"M. Abadi, E. Allender, A. Broder, J. Feigenbaum and L. Hemachandra: On Generating Solved Instances of Computational Problems, Proc. of Crypto 88, Springer Verlag LNCS series."},{"key":"24_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of Crypto 92","author":"J. Bos","year":"1992","unstructured":"J. Bos and D. Chaum: Provably Unforgeable Signatures, Proc. of Crypto 92, Springer Verlag LNCS series."},{"issue":"1","key":"24_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and K. S. McCurley: An Interactive Identification Scheme Based on Discrete Logarithms and Factoring, Journal of Cryptology, 5(1), pp.29\u201339, 1992.","journal-title":"Journal of Cryptology"},{"key":"24_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of EuroCrypt 87","author":"I. Damg\u00e5rd","year":"1987","unstructured":"I. Damg\u00e5rd: Collision Free Hash Functions and Public-Key Signature Schemes, Proc. of EuroCrypt 87, Springer Verlag LNCS series."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"R. Cramer, I. Damg\u00e5rd: Secure Signature Schemes based on Interactive Protocols, BRICS report series, RS-94-29, September 1994, Aarhus University.","DOI":"10.7146\/brics.v1i29.21637"},{"key":"24_CR6","unstructured":"R. Cramer: On Shared Randomness and the Size of Secure Signatures, CWI technical report CS-R9530, April 1995."},{"key":"24_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48658-5_23","volume-title":"Proceedings of Crypto\u201994","author":"C. Dwork","year":"1994","unstructured":"C. Dwork, M. Naor: An Efficient Existentially Unforgeable Signature Scheme and its Applications, Proceedings of Crypto\u201994, Santa Barbara, August 1994, Springer Verlag LNCS series, pp. 234\u2013246."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Shamir: Witness Indistinguishable and Witness Hiding Protocols, Proc. of STOC 90.","DOI":"10.1145\/100216.100272"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat and A. Shamir: Zero-Knowledge Proofs of Identity, Journal of Cryptology 1 (1988) 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"24_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of Crypto 86","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich: Two Remarks concerning the GMR Signature Scheme, Proc. of Crypto 86, Springer Verlag LNCS series."},{"issue":"2","key":"24_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest: A Digital Signature Scheme Secure Against Chosen Message Attacks, SIAM Journal on Computing, 17(2): 281\u2013308, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"24_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of EuroCrypt\u2019 88","author":"L. Guillou","year":"1988","unstructured":"L. Guillou and J.-J. Quisquater: A Practical Zero-Knowledge Protocol fitted to Security Microprocessor Minimizing both Transmission and Memory, Proc. of EuroCrypt\u2019 88, Springer Verlag LNCS series."},{"key":"24_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of Crypto 87","author":"R.C. Merkle","year":"1987","unstructured":"R.C. Merkle: A Digital Signature Based on a Conventional Encryption Function, Proc. of Crypto 87, Springer Verlag LNCS series."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung: Universal One-Way Hash Functions and their Cryptographic Applications, Proc. of STOC 89.","DOI":"10.1145\/73007.73011"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"T. Okamoto: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Proc. of Crypto\u2019 92, pp.31\u201353, Santa Barbara, August 1992.","DOI":"10.1007\/3-540-48071-4_3"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"J. Rompel: One-Way Functions are Necessary and Sufficient for Secure Signatures, Proc. of STOC 90.","DOI":"10.1145\/100216.100269"},{"issue":"3","key":"24_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr: Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3):161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll: Random Self-Reducibility and Zero-Knowledge Proof of Information Possession, Proc. of FOCS 87.","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:18:12Z","timestamp":1556756292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}