{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:34:14Z","timestamp":1775900054932,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540429876","type":"print"},{"value":"9783540456827","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45682-1_32","type":"book-chapter","created":{"date-parts":[[2007,5,26]],"date-time":"2007-05-26T06:31:48Z","timestamp":1180161108000},"page":"552-565","source":"Crossref","is-referenced-by-count":971,"title":["How to Leak a Secret"],"prefix":"10.1007","author":[{"given":"Ronald L.","family":"Rivest","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]},{"given":"Yael","family":"Tauman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,20]]},"reference":[{"key":"32_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-69053-0_32","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 97","author":"J. Camenisch","year":"1997","unstructured":"Jan Camenisch. Efficient and generalized group signatures. In Walter Fumy, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 97,pages 465\u2013479,Berlin,1997.Springer. Lecture Notes in Computer Science 1233."},{"key":"32_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 91","author":"D. Chaum","year":"1991","unstructured":"David Chaum and Eug\u00e8ne Van Heyst. Group signatures.In D.W. Davies,editor, Advances in Cryptology \u2014 Eurocrypt\u2019 91, pages 257\u2013265,Berlin,1991.Springer-Verlag.Lecture Notes in Computer Science No.547."},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 94","author":"R. Cramer","year":"1994","unstructured":"Ronald Cramer, Ivan Damg\u00e5rd,and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo Desmedt,editor, Advances in Cryptology \u2014 CRYPTO\u2019 94,pages 174\u2013187,Berlin,1994.Springer-Verlag.Lecture Notes in Computer Science Volume 839."},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman.New directions in cryptography. IEEE Trans.Inform.Theory,IT-22:644\u2013654,November1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"32_CR5","unstructured":"G.H. Hardy and E.M. Wright.An Introduction to the Theory of Numbers.Oxford, fifth edition,1979."},{"key":"32_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology \u2014 EuroCrypt\u2019 96","author":"M. Jakobsson","year":"1996","unstructured":"M. Jakobsson, K. Sako,and R. Impagliazzo.Designated verifier proofs and their applications.In Ueli Maurer,editor, Advances in Cryptology \u2014 EuroCrypt\u2019 96, pages 143\u2013154,Berlin,1996.Springer-Verlag.Lecture Notes in Computer Science Volume 1070."},{"issue":"2","key":"32_CR7","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff How to construct pseudorandom permutations from pseudorandom functions. SIAM J.Computing,17(2):373\u2013386,April 1988.","journal-title":"SIAM J.Computing"},{"key":"32_CR8","unstructured":"M. Rabin.Digitalized signatures as intractable as factorization.Technical ReportMIT\/LCS\/TR-212,MIT Laboratory for Computer Science,January 1979."},{"issue":"2","key":"32_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Ronald L. Rivest, Adi Shamir,and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM,21(2):120\u2013126,1978.","journal-title":"Communications of the ACM"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Alfredo De Santis, Giovanni Di Crescenzo, Giusepp Persiano,and Moti Yung. On monotone formula closure of SZK.In Proc. 35th FOCS,pages 454\u2013465. IEEE, 1994.","DOI":"10.1109\/SFCS.1994.365745"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45682-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T10:47:46Z","timestamp":1556448466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45682-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540429876","9783540456827"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45682-1_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}