{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:59Z","timestamp":1725488699290},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_19","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"205-220","source":"Crossref","is-referenced-by-count":34,"title":["Weaknesses of Undeniable Signature Schemes"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"M. Blum. Coin flipping by telephone \u2014 a protocol for solving impossible problems. In digest of papers COMPCON82, pp. 133\u2013137. IEEE Computer Society, February 1982."},{"key":"19_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Convertible undeniable signatures","author":"J. Boyar","year":"1990","unstructured":"J. Boyar, D. Chaum, I. Damgard, and T. Pedersen. Convertible undeniable signatures. Presented at Crypto\u2019 90, August 12\u201315, 1990, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto\u2019 90 (Lecture Notes in Computer Science), Springer-Verlag, 1990."},{"issue":"2","key":"19_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2), pp. 84\u201388, February 1981.","journal-title":"Commun. ACM"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1), pp. 65\u201375, 1988.","journal-title":"Journal of Cryptology"},{"key":"19_CR5","unstructured":"D. Chaum. On weaknesses of \u2018weaknesses of undeniable signatures\u2019. Presented at the rump session of Eurocrypt\u2019 91, Brighton, U.K., April (Communicated to us by Gus Simmons.) 1991."},{"key":"19_CR6","unstructured":"D. Chaum. Personal Communication (over the phone, no coin flipping!)."},{"key":"19_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u2019 90","author":"D. Chaum","year":"1991","unstructured":"D. Chaum. Zero-knowledge undeniable signatures. In I. Damg\u00e5rd, editor, Advances in Cryptology, Proc. of Eurocrypt\u2019 90 (Lecture Notes in Computer Science 473), pp. 458\u2013464. Springer-Verlag, 1991. \u00c5arhus, Denmark, May 21\u201324."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Cr\u00e9peau, and I. Damg\u00e5rd. Multiparty unconditionally secure protocols. In Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 11\u201319, May 2\u20134, 1988.","DOI":"10.1145\/62212.62214"},{"key":"19_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/3-540-48184-2_7","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, I. Damg\u00e5rd, and J. van de Graaf. Multiparty computations ensuring privacy of each party\u2019s input and correctness of the result. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pp. 87\u2013119. Springer-Verlag, 1988. Santa Barbara, Ca., August 16\u201320, 1987."},{"key":"19_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings","author":"D. Chaum","year":"1990","unstructured":"D. Chaum and H. van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings (Lecture Notes in Computer Science 435), pp. 212\u2013216. Springer-Verlag, 1990. Santa Barbara, California, U.S.A., August 20\u201324."},{"key":"19_CR11","unstructured":"G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Tech. Report TR-CS-82-2, University of Wisconsin-Milwaukee, October 1982."},{"key":"19_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-39799-X_3","volume-title":"Advances in Cryptology: Crypto\u2019 85, Proceedings","author":"W. Jonge de","year":"1986","unstructured":"W. de Jonge and D. Chaum. Attacks on some RSA signatures. In Advances in Cryptology: Crypto\u2019 85, Proceedings (Lecture Notes in Computer Science 218), pp. 18\u201327. Springer-Verlag, New York, 1986. Santa Barbara, California, U.S.A., August 18\u201322, 1985."},{"key":"19_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-47721-7_4","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 86","author":"W. Jonge de","year":"1987","unstructured":"W. de Jonge and D. Chaum. Some variations on RSA signatures & their security. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u2019 86 (Lecture Notes in Computer Science 263), pp. 49\u201359. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11\u201315."},{"key":"19_CR14","unstructured":"R. A. DeMilo, and M. J. Merritt Chosen signature cryptanalysis of public key cryptosystems. Technical Memorandum, Georgia Institute of Technology, October 1982."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pp. 388\u2013392, 1984.","DOI":"10.1145\/358027.358052"},{"key":"19_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pp. 21\u201339. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16\u201320."},{"key":"19_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/3-540-39799-X_40","volume-title":"Advances in Cryptology: Crypto\u2019 85, Proceedings","author":"Y. Desmedt","year":"1986","unstructured":"Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In Hugh C. Williams, editor, Advances in Cryptology: Crypto\u2019 85, Proceedings (Lecture Notes in Computer Science 218), pp. 516\u2013522. Springer-Verlag, 1986. Santa Barbara, California, U.S.A., August 18\u201320."},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"O. Dolev","year":"1983","unstructured":"O. Dolev and A. Yao. On the security of public key cryptography. IEEE Trans. Inform. Theory, 29, pp. 198\u2013208, March 1983.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"19_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/3-540-48184-2_10","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"Z. Galil","year":"1988","unstructured":"Z. Galil, S. Haber, and M. Yung. Cryptographic computations: secure fault-tolerant protocols and the public-key model In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pp. 135\u2013155. Springer-Verlag, 1988. Santa Barbara, Ca., August 16\u201320, 1987."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth annual ACM Symp. Theory of Computing, STOC, pp. 218\u2013229, May 25\u201327, 1987.","DOI":"10.1145\/28395.28420"},{"key":"19_CR21","unstructured":"S. Micali. Public announcement at Crypto\u2019 89."},{"issue":"5","key":"19_CR22","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J. H. Moore","year":"1988","unstructured":"J. H. Moore. Protocol failures in cryptosystems. Proc. IEEE, 76(5), pp. 594\u2013602, May 1988.","journal-title":"Proc. IEEE"},{"key":"19_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/3-540-46885-4_16","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u2019 89","author":"T. Okamoto","year":"1990","unstructured":"T. Okamoto and K. Ohta. Divertible zero knowledge interactive proofs and commutative random self-reducibility. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology, Proc. of Eurocrypt\u2019 89 (Lecture Notes in Computer Science 434), pp. 134\u2013149. Springer-Verlag, 1990. Houthalen, Belgium, April 10\u201313."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:23Z","timestamp":1605647483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_19","relation":{},"subject":[]}}