{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:40Z","timestamp":1772283640259,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440505","type":"print"},{"value":"9783540457084","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45708-9_11","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T04:48:16Z","timestamp":1192769296000},"page":"162-177","source":"Crossref","is-referenced-by-count":153,"title":["GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Adriana","family":"Palacio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 02","author":"M. Abdalla","year":"2002","unstructured":"M. Abdalla, J. An, M. Bellare and C. Namprempre. From identification to signatures via the Fiat-Shamir Transform: Minimizing assumptions for security and forward-security. Advances in Cryptology \u2014 EUROCRYPT\u2019 02, Lecture Notes in Computer Science Vol. 2332, L. Knudsen ed., Springer-Verlag, 2002."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 97","author":"N. Bari\u0107","year":"1997","unstructured":"N. Bari\u0107 and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. Advances in Cryptology \u2014 EUROCRYPT\u2019 97, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997."},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 01","author":"M. Bellare","year":"2001","unstructured":"M. Bellare, M. Fischlin, S. Goldwasser and S. Micali. Identification protocols secure against reset attacks. Advances in Cryptology \u2014 EUROCRYPT\u2019 01, Lecture Notes in Computer Science Vol. 2045, B. Pfitzmann ed., Springer-Verlag, 2001."},{"key":"11_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"M. Bellare","year":"1999","unstructured":"M. Bellare and S. Miner. A forward-secure digital signature scheme. Advances in Cryptology \u2014 CRYPTO\u2019 99, Lecture Notes in Computer Science Vol. 1666, M. Wiener ed., Springer-Verlag, 1999."},{"key":"11_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography '01","author":"M. Bellare","year":"2001","unstructured":"M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko. The one-more-RSA inversion problems and the security of Chaum\u2019s blind signature scheme. Available as IACR eprint archive Report 2001\/002, http:\/\/www.eprint.iacr.org\/2001\/002\/ . Preliminary version, entitled \u201cThe power of RSA inversion oracles and the security of Chaum\u2019s RSA-based blind signature scheme,\u201d in Financial Cryptography '01, Lecture Notes in Computer Science Vol. 2339, P. Syverson ed., Springer-Verlag, 2001."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"M. Bellare and G. Neven. Transitive signatures based on factoring and RSA. Manuscript, May 2002.","DOI":"10.1007\/3-540-36178-2_25"},{"key":"11_CR7","unstructured":"M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Full version of this paper, available via http:\/\/www-cse.ucsd.edu\/uers\/mihir ."},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44598-6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 00","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, D. Pointcheval and P. Rogaway. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology \u2014 EUROCRYPT\u2019 00, Lecture Notes in Computer Science Vol. 1807, B. Preneel ed., Springer-Verlag, 2000."},{"key":"11_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"M. Bellare","year":"1993","unstructured":"M. Bellare and P. Rogaway. Entity authentication and key distribution. Advances in Cryptology \u2014 CRYPTO\u2019 93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed., Springer-Verlag, 1993."},{"key":"11_CR10","unstructured":"R. Canetti, S. Goldwasser, O. Goldreich and S. Micali. Resettable zeroknowledge. Proceedings of the 32nd Annual Symposium on the Theory of Computing, ACM, 2000."},{"key":"11_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 02","author":"R. Canetti","year":"2002","unstructured":"R. Canetti and H. Krawczyk. Universally composable notions of key-exchange and secure channels. Advances in Cryptology \u2014 EUROCRYPT\u2019 02, Lecture Notes in Computer Science Vol. 2332, L. Knudsen ed., Springer-Verlag, 2002."},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 82","author":"D. Chaum","year":"1983","unstructured":"D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology \u2014 CRYPTO\u2019 82, Lecture Notes in Computer Science, Plenum Press, New York and London, 1983, Aug. 1982."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. In 5th ACM Conference on Computer and Communications Security, pages 46\u201351, Singapore, Nov. 1999. ACM Press.","DOI":"10.1145\/319709.319716"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2):77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. Proceedings of the 22nd Annual Symposium on the Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100272"},{"key":"11_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A. Fiat","year":"1986","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology \u2014 CRYPTO\u2019 86, Lecture Notes in Computer Science Vol. 263, A. Odlyzko ed., Springer-Verlag, 1986."},{"key":"11_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 97","author":"E. Fujisaki","year":"1997","unstructured":"E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. Advances in Cryptology \u2014 CRYPTO\u2019 97, Lecture Notes in Computer Science Vol. 1294, B. Kaliski ed., Springer-Verlag, 1997."},{"key":"11_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 99","author":"R. Gennaro","year":"1999","unstructured":"R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. Advances in Cryptology \u2014 EUROCRYPT\u2019 99, Lecture Notes in Computer Science Vol. 1592, J. Stern ed., Springer-Verlag, 1999."},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal of Computing, 18(1):186\u2013208, February 1989.","journal-title":"SIAM Journal of Computing"},{"key":"11_CR20","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"L. Guillou","year":"1988","unstructured":"L. Guillou and J. J. Quisquater. A \u201cparadoxical\u201d identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology \u2014 CRYPTO\u2019 88, Lecture Notes in Computer Science Vol. 403, S. Goldwasser ed., Springer-Verlag, 1988."},{"key":"11_CR21","series-title":"Lect Notes Comput Sci","volume-title":"Topics in Cryptology \u2014 CT-RSA '02","author":"S. Micali","year":"2002","unstructured":"S. Micali and R. Rivest. Transitive signature schemes. Topics in Cryptology \u2014 CT-RSA '02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002."},{"key":"11_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology \u2014 CRYPTO\u2019 92, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992."},{"key":"11_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 90","author":"H. Ong","year":"1990","unstructured":"H. Ong and C. P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. Advances in Cryptology \u2014 EUROCRYPT\u2019 90, Lecture Notes in Computer Science Vol. 473, I. Damg\u00f8ard ed., Springer-Verlag, 1990."},{"key":"11_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 99","author":"D. Pointcheval","year":"1999","unstructured":"D. Pointcheval. New public key cryptosystems based on the dependent-RSA problems. Advances in Cryptology \u2014 EUROCRYPT\u2019 99, Lecture Notes in Computer Science Vol. 1592, J. Stern ed., Springer-Verlag, 1999."},{"issue":"3","key":"11_CR25","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361\u2013396, 2000.","journal-title":"Journal of Cryptology"},{"issue":"3","key":"11_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"11_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 96","author":"C. P. Schnorr","year":"1996","unstructured":"C. P. Schnorr. Security of the 2t-root identification and signatures. Advances in Cryptology \u2014 CRYPTO\u2019 96, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996."},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s001459900056","volume":"12","author":"V. Shoup","year":"1999","unstructured":"V. Shoup. On the security of a practical identification scheme. Journal of Cryptology, 12:247\u2013260, 1999.","journal-title":"Journal of Cryptology"},{"key":"11_CR29","unstructured":"V. Shoup. On formal models for secure key exchange (version 4). IACR eprint archive Report 1999\/012, http:\/\/www.eprint.iacr.org\/1999\/012\/ ."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45708-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T17:27:41Z","timestamp":1556904461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45708-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440505","9783540457084"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-45708-9_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}