{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T14:54:08Z","timestamp":1769007248845,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540435532","type":"print"},{"value":"9783540460350","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46035-7_27","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T08:21:56Z","timestamp":1186820516000},"page":"400-417","source":"Crossref","is-referenced-by-count":71,"title":["Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods"],"prefix":"10.1007","author":[{"given":"Tal","family":"Malkin","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Micciancio","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Miner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,29]]},"reference":[{"key":"27_CR1","unstructured":"R. Anderson. Two remarks on public-key cryptology. Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security (Apr. 1997)."},{"key":"27_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44448-3_10","volume-title":"Advances in Cryptology-Asiacrypt 2000","author":"M. Abdalla","year":"2000","unstructured":"M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. In Advances in Cryptology-Asiacrypt 2000, LNCS 1976 (Dec. 2000), pp. 116\u2013129."},{"key":"27_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"M. Bellare","year":"1999","unstructured":"M. Bellare and S. Miner. A forward-secure digital signature scheme. In Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666 (Aug. 1999), pp. 431\u2013448."},{"issue":"Nov","key":"27_CR4","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal of Computing 13(4)(Nov. 1984), pp. 850\u2013864.","journal-title":"SIAM Journal of Computing"},{"key":"27_CR5","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4)(Oct. 1986), pp. 281\u2013308. Preliminary version in the Proceedings of the IEEE Symposium on the Foundations of Computer Science, 1984, pp 464\u2013479.","journal-title":"Journal of the ACM"},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2) (Apr. 1988), pp. 281\u2013308.","journal-title":"SIAM Journal of Computing"},{"key":"27_CR7","series-title":"Lect Notes Comput Sci","first-page":"216","volume-title":"Advances in Cryptology-CRYPTO\u2019 88","author":"L.C. Guillou","year":"1988","unstructured":"L.C. Guillou and J.J. Quisquater. A \u201cparadoxical\u201d identity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology-CRYPTO\u2019 88, LNCS 403 (Aug. 1988), pp. 216\u2013231."},{"key":"27_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-44647-8_20","volume-title":"Advances in Cryptology-CRYPTO\u2019 01","author":"G. Itkis","year":"2001","unstructured":"G. Itkis and L. Reyzin. Forward-secure signatures with optimal signing and verifying. In Advances in Cryptology-CRYPTO\u2019 01, LNCS 2139 (Aug. 2001), pp. 332\u2013354."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"H. Krawczyk. Simple forward-secure signatures from any signature scheme. In Seventh ACM Conference on Computer and Communications Security (Nov. 2000), pp. 108\u2013115.","DOI":"10.1145\/352600.352617"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"R. C. Merkle. A certified digital signature. In Advances in Cryptology-CRYPTO\u2019 89, (Aug. 1989), pp. 218\u2013238.","DOI":"10.1007\/0-387-34805-0_21"},{"key":"27_CR11","unstructured":"S. Micali. A secure and efficient digital signature algorithm. Technical Report MIT\/LCS\/TM-501, Massachusetts Institute of Technology, March 1994."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"T. Malkin, D. Micciancio and S. Miner. Efficient generic forward-secure signatures with and unbounded number of time periods. Full version of this paper, available at http:\/\/eprint.iacr.org\/2001\/034\/ .","DOI":"10.1007\/3-540-46035-7_27"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of the ACM Symposium on Theory of Computing, 1989, pp. 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"27_CR14","unstructured":"M. Rabin. Digital signatures and public key functions as intractable as factorization. MIT Laboratory for Computer Science Report TR-212, January 1979."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the ACM Symposium on Theory of Computing, 1990, pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"A. Yao. Theory and applications of trapdoor functions. In Proceedings of the IEEE Symposium on the Foundations of Computer Science, 1982, pp. 80\u201391.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46035-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:20:59Z","timestamp":1556738459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46035-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540435532","9783540460350"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46035-7_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}