{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:09:34Z","timestamp":1725484174979},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440796"},{"type":"electronic","value":"9783540460886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46088-8_24","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:08:39Z","timestamp":1179731319000},"page":"305-318","source":"Crossref","is-referenced-by-count":4,"title":["Monotone Signatures"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,31]]},"reference":[{"key":"24_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology Eurocrypt\u201998","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, J.A. Garay, T. Rabin, Fast Batch verification for modular exponentiation and digital signatures, Advances in Cryptology Eurocrypt\u201998, Springer-Verlag, LNCS 1403, pp. 236\u2013250, 1998."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, Proceedings of the 1-st ACM conference on computer and communications security, pp. 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"24_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology Eurocrypt\u201996","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, P. Rogaway, The exact security of digital signatures-How to sign with RSA and Rabin, Advances in Cryptology Eurocrypt\u201996, Springer-Verlag, LNCS 1070, pp. 399\u2013416, 1996."},{"key":"24_CR4","unstructured":"S. Brands, An efficient off-line electronic cash system based on the representation problem, Technical report, CWI (Centrum voor Wiskunde en Informatica), 1993. Also available on-line: http:\/\/www.cwi.nl\/cwi\/publications CS-R9323."},{"issue":"4","key":"24_CR5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology, vol. 1, no. 2, pp. 77\u201395, 1988.","journal-title":"Journal of Cryptology"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, R. Rivest, A Digital signature scheme secure against adaptative chosen-message attacks, SIAM journal of computing, vol. 17, pp. 281\u2013308, 1988.","journal-title":"SIAM journal of computing"},{"key":"24_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology Crypto\u201995","author":"A. Herzberg","year":"1995","unstructured":"A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing, or: how to cope with perpetual leakage, Advances in Cryptology Crypto\u201995, Springer-Verlag, LNCS 963, pp. 339\u2013352, 1995."},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, M. Yung, Revokable and versatile electronic money, Proceedings of the 3-rd ACM conference on computer and communications security, pp. 76\u201387, 1996.","DOI":"10.1145\/238168.238191"},{"key":"24_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/BFb0053435","volume-title":"Advances in Cryptology Eurocrypt\u201994","author":"C. Li","year":"1995","unstructured":"C. Li, T. Hwang, M. Lee, (t,n)-threshold signature schemes based on discrete logarithm. Advances in Cryptology Eurocrypt\u201994, Springer-Verlag, LNCS 950, pp. 191\u2013200, 1995."},{"key":"24_CR11","series-title":"Lect Notes Comput Sci","first-page":"77","volume-title":"Advances in Cryptology Eurocrypt\u201994","author":"D. Mra\u00efhi","year":"1995","unstructured":"D. M\u2019ra\u00efhi, D. Naccache, S. Vaudenay, D. Raphaeli, Can D. S. A. be improved ? Complexity trade-offs with the digital signature standard, Advances in Cryptology Eurocrypt\u201994, Springer-Verlag, LNCS 950, pp. 77\u201385, 1995."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"D. M\u2019ra\u00efhi, D. Naccache, Batch exponentiation-A fast DLP-based signature generation strategy, 3-rd ACM conference on communications and computer security, pp. 58\u201361, 1996.","DOI":"10.1145\/238168.238187"},{"key":"24_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-48892-8_6","volume-title":"Proceedings of the fifth annual workshop on selected areas in cryptography","author":"D. Mra\u00efhi","year":"1998","unstructured":"D. M\u2019ra\u00efhi, D. Naccache, D. Pointcheval, S. Vaudenay, Computational alternatives to random number generators, Proceedings of the fifth annual workshop on selected areas in cryptography, LNCS 1556, pp. 72\u201380, 1998. Springer-Verlag."},{"key":"24_CR14","unstructured":"NIST, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186, 1994."},{"key":"24_CR15","series-title":"Lect Notes Comput Sci","first-page":"31","volume-title":"Advances in Cryptology Crypto\u201992","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, Advances in Cryptology Crypto\u201992, Springer-Verlag, LNCS 740, pp. 31\u201353, 1992."},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, vol. 13, no. 3, pp. 361\u2013396, 2000.","journal-title":"Journal of Cryptology"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, Method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, vol. 21, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"issue":"3","key":"24_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. Schnorr","year":"1991","unstructured":"C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol. 4, no. 3, pp. 161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"24_CR19","unstructured":"V. Shoup, Practical threshold signatures, Technical report, IBM Research, June 1999. Report RZ 3121."},{"key":"24_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-39757-4_25","volume-title":"Advances in Cryptology Eurocrypt\u201984","author":"G. Simmons","year":"1985","unstructured":"G. Simmons, The subliminal channel and digital signatures, Advances in Cryptology Eurocrypt\u201984, Springer-Verlag, LNCS 209, pp. 364\u2013378, 1985."},{"key":"24_CR21","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"S. von Solms, D. Naccache, On blind signatures and perfect crimes, Computers & Security, vol. 11, pp. 581\u2013583, 1992","journal-title":"Computers & Security"},{"key":"24_CR22","unstructured":"R.L. Van Renesse, Optical document security, Artech House Optoelectronics Library, 2-nd edition, 1998."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46088-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:24:24Z","timestamp":1556418264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46088-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440796","9783540460886"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-46088-8_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}