{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:16:19Z","timestamp":1768914979724,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440796","type":"print"},{"value":"9783540460886","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46088-8_25","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:08:39Z","timestamp":1179745719000},"page":"319-338","source":"Crossref","is-referenced-by-count":45,"title":["The Power of RSA Inversion Oracles and the Security of Chaum\u2019s RSA-Based Blind Signature Scheme"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Chanathip","family":"Namprempre","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Semanko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,31]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"J. Abbott, M. Bronstein, and T. Mulders. Fast deterministic computation of determinants of dense matrices. In Proceedings of ACM International Symposium on Symbolic and Algebraic Computation, pages 197\u2013204. ACM Press, 1999.","DOI":"10.1145\/309831.309934"},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201997","author":"N. Bari\u0107","year":"1997","unstructured":"N. Bari\u0107 and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In W. Fumy, editor, Advances in Cryptology \u2014 EUROCRYPT\u201997, volume 1233 of Lecture Notes in Computer Science, pages 480\u2013494. Springer-Verlag, Berlin Germany, May 1997."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In V. Ashby, editor, 1st ACM Conference on Computer and Communications Security. ACM Press, Nov. 1993.","DOI":"10.1145\/168588.168596"},{"key":"25_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology-EUROCRYPT\u201996","author":"M. Bellare","year":"1996","unstructured":"M. Bellare and P. Rogaway. The exact security of digital signatures\u2014how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology-EUROCRYPT\u201996, volume 1070 of Lecture Notes in Computer Science, pages 399\u2013416. Springer-Verlag, Berlin Germany, 12\u201316 May 1996."},{"issue":"2","key":"25_CR5","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society, 46(2):203\u2013213, Feb. 1999.","journal-title":"Notices of the American Mathematical Society"},{"key":"25_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BFb0054117","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"D. Boneh","year":"1998","unstructured":"D. Boneh and R. Venkatesan. Breaking RSA may not be equivalent to factoring. In K. Nyberg, editor, Advances in Cryptology \u2014 EUROCRYPT\u201998, volume 1233 of Lecture Notes in Computer Science, pages 59\u201371. Springer-Verlag, Berlin Germany, 1998."},{"key":"25_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201982","author":"D. Chaum","year":"1983","unstructured":"D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology \u2014 CRYPTO\u201982, Lecture Notes in Computer Science, pages 199\u2013203. Plenum Press, New York and London, 1983, Aug. 1982."},{"key":"25_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"J. Coron","year":"2000","unstructured":"J. Coron. On the exact security of full domain hash. In M. Bellare, editor, Advances in Cryptology \u2014 CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229\u2013235. Springer-Verlag, Berlin Germany, Aug. 2000."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. In 5th ACM Conference on Computer and Communications Security, pages 46\u201351. ACM Press, Nov. 1999.","DOI":"10.1145\/319709.319716"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"W. Eberly, M. Giesbrecht, and G. Villard. Computing the determinant and Smith form of an integer matrix. In Proceedings of the 41st Symposium on Foundations of Computer Science. IEEE, 2000.","DOI":"10.1109\/SFCS.2000.892335"},{"key":"25_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201997","author":"E. Fujisaki","year":"1997","unstructured":"E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In B. Kaliski Jr., editor, Advances in Cryptology \u2014 CRYPTO\u201997, volume 1294 of Lecture Notes in Computer Science, pages 16\u201330. Springer-Verlag, Berlin Germany, 17\u201321 Aug. 1997."},{"key":"25_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-48910-X_9","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201999","author":"R. Gennaro","year":"1999","unstructured":"R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In J. Stern, editor, Advances in Cryptology \u2014 EUROCRYPT\u201999, volume 1592 of Lecture Notes in Computer Science, pages 123\u2013139. Springer-Verlag, Berlin Germany, May 1999."},{"issue":"2","key":"25_CR13","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281\u2013308, Apr. 1988. Special issue on cryptography.","journal-title":"SIAM Journal on Computing"},{"key":"25_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/BFb0052233","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201997","author":"A. Juels","year":"1997","unstructured":"A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In B. Kaliski Jr., editor, Advances in Cryptology \u2014 CRYPTO\u201997, volume 1294 of Lecture Notes in Computer Science, pages 150\u2013164. Springer-Verlag, Berlin Germany, 17\u201321 Aug. 1997."},{"key":"25_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/BFb0055857","volume-title":"Computer Security \u2014 ESORICS\u201998","author":"M. Michels","year":"1998","unstructured":"M. Michels, M. Stadler, and H. Sun. The security of some variants of the RSA signature scheme. In Y. Deswarte, editor, Computer Security \u2014 ESORICS\u201998, volume 1485 of Lecture Notes in Computer Science, pages 85\u201396. Springer-Verlag, Berlin Germany, 1998."},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/BFb0054141","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"D. Pointcheval","year":"1998","unstructured":"D. Pointcheval. Strengthened security for blind signatures. In K. Nyberg, editor, Advances in Cryptology \u2014 EUROCRYPT\u201998, volume 1403, pages 391\u2013405. Springer-Verlag, Berlin Germany, 31\u20134 June 1998."},{"key":"25_CR17","first-page":"239","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201999","author":"D. Pointcheval","year":"1999","unstructured":"D. Pointcheval. New public key cryptosystems based on the dependent-RSA problems. In J. Stern, editor, Advances in Cryptology \u2014 EUROCRYPT\u201999, volume 1592, pages 239\u2013255. Springer-Verlag, Berlin Germany, 1999."},{"key":"25_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0034852","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201996","author":"D. Pointcheval","year":"1996","unstructured":"D. Pointcheval and J. Stern. Provably secure blind signature schemes. In K. Kim and T. Matsumoto, editors, Advances in Cryptology \u2014 ASIACRYPT\u201996, Lecture Notes in Computer Science, pages 252\u2013265. Springer-Verlag, Berlin Germany, 1996."},{"issue":"3","key":"25_CR19","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361\u2013396, 2000.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46088-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T20:46:14Z","timestamp":1550349974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46088-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440796","9783540460886"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-46088-8_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}