{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:43:58Z","timestamp":1748583838574},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_32","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"397-409","source":"Crossref","is-referenced-by-count":33,"title":["Threshold DSS Signatures without a Trusted Party"],"prefix":"10.1007","author":[{"given":"Susan K.","family":"Langford","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"32_CR1","unstructured":"\u201cA proposed federal information processing standard for digital signature standard (DSS),\u201d Federal Register, August 1991."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"B. Blakley, G. Blakley, A. Chan, and J. Massey. \u201cThreshold schemes with disenrollment. Advances in Cryptology\u2014Crypto\u2019 92 proceedings, Springer-Verlag, 1993. p. 540\u20138.","DOI":"10.1109\/ISIT.1993.748543"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"C. Charnes, J. Pieprzyk, and R. Safavi-Naini, \u201cConditionally secure secret sharing schemes with disenrollment capability,\u201d 2nd ACM conference on Computer and Communications Security, Fairfax, Virginia, Nov. 2\u20134, 1994, pp. 89\u201395.","DOI":"10.1145\/191177.191196"},{"key":"32_CR4","unstructured":"D. Coppersmith, personal communication."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, \u201cSociety and group oriented cryptography,\u201d Advances in Cryptology\u201420Crypto\u2019 87 proceedings, Springer-Verlag, 1988, pp. 120\u2013127.","DOI":"10.1007\/3-540-48184-2_8"},{"issue":"4","key":"32_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. Desmedt","year":"1994","unstructured":"Y. Desmedt, \u201cThreshold Cryptography,\u201d European Transactions on Telecommunications and Related Technologies, Vol. 5, No. 4, July\u2013August 1994, pp. 35\u201343.","journal-title":"European Transactions on Telecommunications and Related Technologies"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel, \u201cShared generation of authenticators and signatures,\u201d Advances in Cryptology\u2014Crypto\u2019 91 proceedings, Springer-Verlag, 1992, pp. 457\u2013269.","DOI":"10.1007\/3-540-46766-1_37"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TIT.1985.1057057","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. Inform. Theory, Vol. 31, 1985, pp. 521\u2013539.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"32_CR9","unstructured":"Y. Frankel and Y. Desmedt, \u201cParallel reliable threshold multisignature,\u201d Tech. Report TR-92-04-02, Dep. of EE & CS, Univ. of Wisconsin-Milwaukee, April 1992."},{"issue":"5","key":"32_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"L. Harn, \u201cGroup-oriented (t, n) threshold digital signature scheme and digital multisignature,\u201d IEE Proc.-Comput. Digit. Tech., Vol. 141, No. 5, September 1994, pp. 307\u2013313.","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"C. Laih and L. Harn, \u201cGeneralized threshold cyrptosystems,\u201d Advances in Cryptology \u2014 Asiacrypt\u2019 91 proceedings, Springer-Verlag, 1993, pp. 159\u2013166.","DOI":"10.1007\/3-540-57332-1_13"},{"key":"32_CR12","unstructured":"S. Langford, Differential-Linear Cryptanalysis and Threshold Signatures, Ph.D. Thesis, Stanford University, June 1995."},{"key":"32_CR13","unstructured":"C. Li, T. Hwang, N. Lee, \u201c(t, n)-threshold signature scheme based on discrete logarithm,\u201d Advances in Cryptology \u2014 Eurocrypt\u2019 94 proceedings, to appear."},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA method for obtaining digital signatures and public key cryptosystems,\u201d Communications of the ACM, Vol. 21, April 1978, pp. 294\u2013299.","journal-title":"Communications of the ACM"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to share a secret,\u201d Commun. ACM, 22:612\u2013613, November 1979.","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T12:12:38Z","timestamp":1708171958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}