{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:17:45Z","timestamp":1725495465376},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430100"},{"type":"electronic","value":"9783540453116"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45311-3_17","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T14:01:41Z","timestamp":1195048901000},"page":"175-187","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of Integrity Services in Protocols"],"prefix":"10.1007","author":[{"given":"Kapali","family":"Viswanathan","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,26]]},"reference":[{"key":"17_CR1","unstructured":"Mart\u00edn Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), Sendai, Japan, 2000. To appear."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-48000-6_21","volume-title":"Advances in Cryptology-ASIACRYPT\u201999","author":"M. Abe","year":"1999","unstructured":"Masayuki Abe. Mix-networks on permutations networks. In K. Lam, E. Okamoto, and C. Xing, editors, Advances in Cryptology-ASIACRYPT\u201999, volume 1716 of LNCS, pages 258\u2013273. Springer-Verlag, 1999."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Matt Blaze. Protocol failure in the escrowed encryption standard. In The 2nd ACM Conference on Computer and Communications Security, November 1994.","DOI":"10.1145\/191177.191193"},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","first-page":"344","volume-title":"Advances in Cryptology-CRYPTO\u201993","author":"S. Brands","year":"1993","unstructured":"Stefan Brands. Untraceable Off-line Cash in Wallet with Observers. In Tor Helleseth, editor, Advances in Cryptology-CRYPTO\u201993, volume 773 of LNCS, pages 344\u2013359. Springer-Verlag, 1993."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. In Proceedings of the Royal Society of London, volume 426, pages 233\u2013271, 1989.","DOI":"10.1145\/74850.74852"},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","first-page":"212","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"D. Chaum","year":"1989","unstructured":"D. Chaum and H. van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology-CRYPTO\u201989, volume 435 of LNCS, pages 212\u2013216. Springer-Verlag, 1989."},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","first-page":"89","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"D. Chaum","year":"1992","unstructured":"David Chaum and T. Pedersen. Wallet Databases with Observers. In Ernest F. Brickell, editor, Advances in Cryptology-CRYPTO\u201992, volume 740 of LNCS, pages 89\u2013105. Springer-Verlag, 1992."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"David Chaum. Blind Signatures for Untraceable Payments. In Sherman A.T. Chaum D., Rivest R.L., editor, Advances in Cryptology-CRYPTO\u201982, pages 199\u2013203. Plenum Press, 1983.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"17_CR9","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology-CRYPTO\u201986","author":"A. Fiat","year":"1986","unstructured":"A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology-CRYPTO\u201986, volume 263 of LNCS, pages 186\u2013194. Springer-Verlag, 1986."},{"key":"17_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68339-9_21","volume-title":"Advances in Cryptology-EUROCRYPT\u201996","author":"L. R. Knudsen","year":"1996","unstructured":"Lars R. Knudsen and Torben P. Pedersen. On the difficulty of software key escrow. In U. M. Maurer, editor, Advances in Cryptology-EUROCRYPT\u201996, volume 1070 of LNCS, pages 237\u2013244. Springer-Verlag, 1996."},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/280559.280563","volume":"32","author":"B. Pfitzmann","year":"1998","unstructured":"Birgit Pfitzmann and Michael Waidner. How to break fraud-detectable key recovery. Operating Systems Review, ACM press, 32(1):23\u201328, January 1998.","journal-title":"Operating Systems Review"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","first-page":"24","volume-title":"Financial Cryptography, FC\u201997","author":"C. Radu","year":"1997","unstructured":"Cristian Radu, Ren\u00e9 Govaerts, and Joos Vandewalle. Efficient electronic cash with restricted privacy. In Rafael Hirschfeld, editor, Financial Cryptography, FC\u201997, volume 1318 of LNCS, pages 24\u201328. Springer-Verlag, 1997."},{"issue":"2","key":"17_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"17_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-46416-6_33","volume-title":"Advances in Cryptology-EUROCRYPT\u201991","author":"R. A. Rueppel","year":"1991","unstructured":"Rainer A. Rueppel. A formal approach to security architectures. In Donald W. Davies, editor, Advances in Cryptology-EUROCRYPT\u201991, volume 547 of LNCS, pages 387\u2013398. Springer-Verlag, 1991."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4:161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"17_CR16","unstructured":"U.S. DEPARTMENT OF COMMERCE \/ National Institute of Standards and Technology. Federal Information Processing Standard 185\u2014Escrowed Encryption Standard, February 1994."},{"key":"17_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/3-540-69053-0_10","volume-title":"Advances in Cryptology-EUROCRYPT\u201997","author":"E. R. Verheul","year":"1997","unstructured":"Eric R. Verheul and Henk C.A. van Tilborg. Binding ElGamal: A fraud-detectable alternative to key-escrow proposals. In Walter Fumy, editor, Advances in Cryptology-EUROCRYPT\u201997, volume 1233 of LNCS, pages 119\u2013133. Springer-Verlag, 1997."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"B. von Solms and D. Naccache. On Blind Signatures and perfect crimes. Computers and Security, pages 581\u2013583, October 1992.","DOI":"10.1016\/0167-4048(92)90193-U"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45311-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T03:29:21Z","timestamp":1547868561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45311-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430100","9783540453116"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45311-3_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}