{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:02:27Z","timestamp":1753884147074},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_7","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"84-96","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver"],"prefix":"10.1007","author":[{"given":"Shai","family":"Halevi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"7_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-38424-3_4","volume-title":"Proceedings CRYPTO 90","author":"G. Brassard","year":"1991","unstructured":"G. Brassard and C. Cr\u00e8peau. Quantum bit commitment and coin tossing protocols. In A.J. Menezes and S. A. Vanstone, editors, Proceedings CRYPTO 90, pages 49\u201361. Springer-Verlag, 1991. Lecture Notes in Computer Science No. 537."},{"issue":"2","key":"7_CR2","first-page":"156","volume":"37","author":"G. Brassard","year":"1988","unstructured":"G. Brassard, D. Chaum, and C. Cr\u00e9peau. Minimum disclosure proofs of knowledge. JCSS, 37(2):156\u2013189, 1988.","journal-title":"JCSS"},{"key":"7_CR3","unstructured":"M. Blum. Coin flipping by telephone. In Proc. IEEE Spring COMPCOM, pages 133\u2013137. IEEE, 1982."},{"key":"7_CR4","unstructured":"M. Blum and S. Micali. Coin flipping into a well. Unpublished, 1981."},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Computing, 13(4):850\u2013863, November 1984.","journal-title":"SIAM J. Computing"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Micali, and R. Ostrovsky. The (true) complexity of statistical zero-knowledge. In Proc. 22nd ACM Symposium on Theory of Computing, pages 494\u2013502, Baltimore, Maryland, 1990. ACM.","DOI":"10.1145\/100216.100285"},{"key":"7_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Proceedings of EUROCRYPT 87","author":"I.B. Damg\u00e5rd","year":"1988","unstructured":"I.B. Damg\u00e5rd. Collision free hash functions and public key signature schemes. In David Chaum and Wyn L. Price, editors, Proceedings of EUROCRYPT 87, pages 203\u2013216. Springer-Verlag, 1988. Lecture Notes in Computer Science No. 304."},{"key":"7_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/0-387-34805-0_3","volume-title":"Proceedings CRYPTO 89","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"I.B. Damg\u00e5rd. On the existence of a bit commitment schemes and zero-knowledge proofs. In G. Brassard, editor, Proceedings CRYPTO 89, pages 17\u201329. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435."},{"key":"7_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-48329-2_22","volume-title":"Proceedings CRYPTO 93","author":"I.B. Damg\u00e5rd","year":"1994","unstructured":"I.B. Damg\u00e5rd, T.P. Pedersen, and B. Pfitzmann. On the existence of statistically hiding bit commitment schemes and fail-stop signatures. In Douglas R. Stinson, editor, Proceedings CRYPTO 93, pages 250\u2013265. Springer, 1994. Lecture Notes in Computer Science No. 773."},{"issue":"2","key":"7_CR10","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2):270\u2013299, April 1984.","journal-title":"JCSS"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM J. Computing"},{"issue":"1","key":"7_CR12","first-page":"691","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(1):691\u2013729, 1991.","journal-title":"Journal of the ACM"},{"key":"7_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/3-540-48658-5_20","volume-title":"Proceedings CRYPTO 94","author":"T. Itoh","year":"1994","unstructured":"T. Itoh, Y. Ohta, and H. Shizuya. Language dependent secure bit commitment. In Yvo G. Desmedt, editor, Proceedings CRYPTO 94, pages 188\u2013201. Springer, 1994. Lecture Notes in Computer Science No. 839."},{"key":"7_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/0-387-34805-0_13","volume-title":"Proceedings CRYPTO 89","author":"M. Naor","year":"1990","unstructured":"M. Naor. Bit commitment using pseudo-randomness. In G. Brassard, editor, Proceedings CRYPTO 89, pages 128\u2013137. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435."},{"key":"7_CR15","series-title":"Lect Notes Comput Sci","first-page":"196","volume-title":"Proceedings CRYPTO 92","author":"M. Naor","year":"1992","unstructured":"M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung. Perfect zero-knowledge arguments for np can be based on general complexity assumptions. In Ernest F. Brickell, editor, Proceedings CRYPTO 92, pages 196\u2013214. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T03:04:48Z","timestamp":1550804688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}