{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:43:38Z","timestamp":1725486218804},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540431688"},{"type":"electronic","value":"9783540456643"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45664-3_25","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:32:07Z","timestamp":1180891927000},"page":"346-356","source":"Crossref","is-referenced-by-count":11,"title":["One-Way Cross-Trees and Their Applications"],"prefix":"10.1007","author":[{"given":"Marc","family":"Joye","sequence":"first","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,5]]},"reference":[{"key":"25_CR1","unstructured":"FIPS 180-1. Secure hash standard. Federal Information Processing Standards Publication 180-1, NIST, U.S. Department of Commerce, April 1995."},{"key":"25_CR2","unstructured":"R. Anderson, H. Manifavas, and C. Sutherland. A practical electronic cash system. Available from URL \u2329 http:\/\/www.cl.cam.ac.uk\/users\/rja14\/ \u232a, 1995."},{"key":"25_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-61770-1_32","volume-title":"Server-supported signatures","author":"N. Asokan","year":"1996","unstructured":"N. Asokan, G. Tsudik, and M. Waidner. Server-supported signatures. In E. Bertino, editor, Fourth European Symposium on Research in Computer Security (ESORICS\u2019 96), volume 1146 of Lecture Notes in Computer Science, pages 131\u2013143. Springer-Verlag, 1996."},{"key":"25_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/3-540-48658-5_9","volume-title":"Advances in Cryptology \u2014CRYPTO\u201994","author":"D. Bleichenbacher","year":"1994","unstructured":"D. Bleichenbacher and U.M. Maurer. Directed acyclic graphs, one-way functions and digital signatures. In Y.G. Desmedt, editor, Advances in Cryptology \u2014CRYPTO\u201994, volume 839 of Lecture Notes in Computer Science, pages 75\u201382. Springer-Verlag, 1994."},{"key":"25_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-48658-5_10","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201994","author":"O. Delos","year":"1994","unstructured":"O. Delos and J.-J. Quisquater. An identity-based signature scheme with bounded life-span. In Y.G. Desmedt, editor, Advances in Cryptology \u2014 CRYPTO\u201994, volume 839 of Lecture Notes in Computer Science, pages 83\u201394. Springer-Verlag, 1994."},{"key":"25_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/3-540-57341-0_55","volume-title":"Computer Security and Industrial Cryptography","author":"D. Waleffe de","year":"1993","unstructured":"D. de Waleffe and J.-J. Quisquater. Better login protocols for computer networks. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, pages 50\u201370. Springer-Verlag, 1993."},{"key":"25_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201989","author":"S. Even","year":"1990","unstructured":"S. Even, O. Goldreich, and S. Micali. On-line\/off-line digital signatures. In G. Brassard, editor, Advances in Cryptology \u2014 CRYPTO\u201989, volume 435 of Lecture Notes in Computer Science, pages 263\u2013275. Springer-Verlag, 1990."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"N.M. Haller. The S\/KEY one-time password system. In Proc. of the ISOC Symposium on Networks andDistribute dSystems Security, 1994.","DOI":"10.17487\/rfc1760"},{"key":"25_CR9","unstructured":"L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1979."},{"issue":"11","key":"25_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport. Password authentication with insecure communication. Comm. ACM, 24(11):770\u2013772, November 1981.","journal-title":"Comm. ACM"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operations. In Proc. of the 3rdA CM Conference on Computer andCommunic ations Security, pages 48\u201357. ACM Press, 1996.","DOI":"10.1145\/238168.238185"},{"key":"25_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201987","author":"R.C. Merkle","year":"1988","unstructured":"R.C. Merkle. A digital signature based on a conventional encryption function. In C. Pomerance, editor, Advances in Cryptology \u2014 CRYPTO\u201987, volume 293 of Lecture Notes in Computer Science, pages 369-378. Springer-Verlag, 1988."},{"key":"25_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201989","author":"R.C. Merkle","year":"1990","unstructured":"R.C. Merkle. A certified digital signature. In G. Brassard, editor, Advances in Cryptology \u2014 CRYPTO\u201989, volume 435 of Lecture Notes in Computer Science, pages 218\u2013238. Springer-Verlag, 1990."},{"key":"25_CR14","unstructured":"M.O. Rabin. Digitalized signatures. In D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 155\u2013168. Academic Press, 1978."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message digest algorithm. Internet Request for Comments RFC 1321, April 1992. Available at \u2329 ftp:\/\/ds.internic.net\/rfc\/rfc1321.txt \u232a.","DOI":"10.17487\/rfc1321"},{"issue":"1","key":"25_CR16","first-page":"7","volume":"2","author":"R.L. Rivest","year":"1996","unstructured":"R.L. Rivest and A. Shamir. PayWord and MicroMint: two simple micropayment schemes. CryptoBytes, 2 (1), 7\u201311, 1996.","journal-title":"CryptoBytes"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45664-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:58:30Z","timestamp":1556456310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45664-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540431688","9783540456643"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45664-3_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}