{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:23:50Z","timestamp":1778693030639,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540675174","type":"print"},{"value":"9783540455394","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45539-6_31","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T16:26:08Z","timestamp":1184603168000},"page":"431-444","source":"Crossref","is-referenced-by-count":271,"title":["Efficient Proofs that a Committed Number Lies in an Interval"],"prefix":"10.1007","author":[{"given":"Fabrice","family":"Boudot","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2000,5,12]]},"reference":[{"key":"31_CR1","unstructured":"Bao, F.: An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. Proceedings of CARDIS\u201998 (1998)"},{"key":"31_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-48184-2_11","volume-title":"Proceedings of CRYPTO\u201987","author":"E. Brickell","year":"1988","unstructured":"Brickell, E., Chaum, D., Damg\u00e5rd, I., Van de Graaf, J.: Gradual and Verifiable Release of a Secret. Proceedings of CRYPTO\u201987, LNCS 293 (1988) 156\u2013166"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. Proceedings of the First Annual Conference and Communications Security (1993) 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-540-47942-0_8","volume-title":"Proceedings of the Second International Conference on Information and Communication Security","author":"F. Boudot","year":"1999","unstructured":"Boudot, F., Traor\u00e9, J.: Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. Proceedings of the Second International Conference on Information and Communication Security, LNCS 1726 (1999) 87\u2013102"},{"key":"31_CR5","series-title":"Lect Notes Comput Sci","first-page":"174","volume-title":"Proceedings of CRYPTO\u201994","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Proceedings of CRYPTO\u201994, LNCS 839 (1997) 174\u2013187"},{"key":"31_CR6","series-title":"Lect Notes Comput Sci","first-page":"127","volume-title":"Proceedings of EUROCRYPT\u201987","author":"D. Chaum","year":"1998","unstructured":"Chaum, D., Evertse, J.-H., Van de Graaf, J.: An Improved Protocol for Demonstrating Possession of Discrete Logarithm and Some Generalizations. Proceedings of EUROCRYPT\u201987, LNCS 304 (1998) 127\u2013141"},{"key":"31_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/BFb0054154","volume-title":"Proceedings of EUROCRYPT\u201998","author":"A. Chan","year":"1998","unstructured":"Chan, A., Frankel, Y., Tsiounis, Y,: Easy Come-Easy Go Divisible Cash. Proceedings of EUROCRYPT\u201998, LNCS 1403 (1998) 561\u2013575"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Chan, A., Frankel, Y., Tsiounis, Y,: Easy Come-Easy Go Divisible Cash. Updated version with corrections, GTE Tech. Rep. (1998), available at http:\/\/www.ccs.neu.edu\/home\/yiannis\/","DOI":"10.1007\/BFb0054154"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Michels, M.: A Group Signature Scheme Based on an RSA-Variant. Tech. Rep. RS-98-27, BRICS, Dept. of Comp. Sci., University of Aarhus, available at http:\/\/www.zurich.ibm.com\/~jca\/ (1998)","DOI":"10.7146\/brics.v5i27.19433"},{"key":"31_CR10","series-title":"Lect Notes Comput Sci","first-page":"106","volume-title":"Proceedings of EUROCRYPT\u201999","author":"J. Camenisch","year":"1999","unstructured":"Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. Proceedings of EUROCRYPT\u201999, LNCS 1592 (1999) 106\u2013121"},{"key":"31_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"Proceedings of CRYPTO\u201999","author":"J. Camenisch","year":"1999","unstructured":"Camenisch, J., Michels, M.: Separability and Efficiency for Generic Group Signature Schemes. Proceedings of CRYPTO\u201999, LNCS 1666 (1999) 413\u2013430"},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","first-page":"89","volume-title":"Proceedings of CRYPTO\u201992","author":"D. Chaum","year":"1992","unstructured":"Chaum, D., Pedersen, T.-P.: Wallet Databases with Observers. Proceedings of CRYPTO\u201992, LNCS 740 (1992) 89\u2013105"},{"key":"31_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Proceedings of CRYPTO\u201997","author":"E. Fujisaki","year":"1997","unstructured":"Fujisaki, E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. Proceedings of CRYPTO\u201997, LNCS 1294 (1997) 16\u201330"},{"key":"31_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/BFb0054115","volume-title":"Proceedings of EUROCRYPT\u201998","author":"E. Fujisaki","year":"1998","unstructured":"Fujisaki, E., Okamoto, T.: A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications, Proceedings of EUROCRYPT\u201998, LNCS 1403 (1998) 32\u201346"},{"key":"31_CR15","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Proceedings of CRYPTO\u201986","author":"A. Fiat","year":"1986","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Proceedings of CRYPTO\u201986, LNCS 263 (1986) 186\u2013194"},{"key":"31_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Proceedings of EUROCRYPT\u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-Certified Public Keys. Proceedings of EUROCRYPT\u201991, LNCS 547 (1991) 490\u2013497"},{"key":"31_CR17","first-page":"27","volume":"98","author":"W. Mao","year":"1998","unstructured":"Mao, W.: Guaranteed Correct Sharing of Integer Factorization with Off-line Shareholders. Proceedings of Public Key Cryptography 98, (1998) 27\u201342","journal-title":"Proceedings of Public Key Cryptography"},{"key":"31_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Proceedings of EUROCRYPT\u201998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. Proceedings of EUROCRYPT\u201998, LNCS 1403 (1998) 308\u2013318"},{"issue":"3","key":"31_CR19","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00196725","volume":"4","author":"C.-P. Schnorr","year":"1991","unstructured":"Schnorr, C.-P.: Efficient Signature Generation for Smart Cards Journal of Cryptology, (4:3) (1991) 239\u2013252","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45539-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T03:37:24Z","timestamp":1556681844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45539-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540675174","9783540455394"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45539-6_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}