{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:01Z","timestamp":1725488701475},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"},{"type":"electronic","value":"9783540464167"}],"license":[{"start":{"date-parts":[[1991,1,1]],"date-time":"1991-01-01T00:00:00Z","timestamp":662688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-46416-6_29","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"337-351","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On the Complexity of Hyperelliptic Discrete Logarithm Problem"],"prefix":"10.1007","author":[{"given":"Haroka","family":"Shizuya","sequence":"first","affiliation":[]},{"given":"Toshiya","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"W. Aiello and J. H\u00e5stad, \u201cStatistical zero-knowledge languages can be recognized in two rounds,\u201d Proc. 28th FOCS, pp.439\u2013448 (1987).","DOI":"10.1109\/SFCS.1987.47"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"L\u00e1szl\u00f3 Babai, \u201cTrading group theory to randomness,\u201d Proc. 17th STOC, pp.421\u2013429 (1985).","DOI":"10.1145\/22145.22192"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TIT.1979.1056010","volume":"IT-25","author":"G. Brassard","year":"1979","unstructured":"Gilles Brassard, \u201cA note on the complexity of cryptography,\u201d IEEE Trans. Inf. Theory, vol.IT-25, no.2, pp.232\u2013233 (1979).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2307\/2007876","volume":"48","author":"D. G. Cantor","year":"1987","unstructured":"David G. Cantor, \u201cComputing in the Jacobian of a hyperelliptic curve,\u201d Math. Comp., vo1.48, no.177, pp.95\u2013101 (1987).","journal-title":"Math. Comp."},{"issue":"6","key":"29_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography,\u201d IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644\u2013654 (1976).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Lance J. Fortnow, \u201cThe complexity of perfect zero-knowledge,\u201d Proc. 19th STOC, pp.204\u2013209 (1987).","DOI":"10.1145\/28395.28418"},{"key":"29_CR7","unstructured":"O. Goldreich and E. Kushilevitz, \u201cA perfect zero-knowledge interactive proof for a problem equivalent to discrete logarithm,\u201d Proc. CRYPT0\u201988 (1988)."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, \u201cThe zero-knowledge complexity of interactive proof-systems,\u201d Proc. 17th STOC, pp.291\u2013304 (1985).","DOI":"10.1145\/22145.22178"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, \u201cProofs that yield nothing but their validity and a methodology of cryptographic protocol design,\u201d Proc. 27th FOCS, pp.174\u2013187 (1986).","DOI":"10.1109\/SFCS.1986.47"},{"key":"29_CR10","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, \u201cProofs that yield nothing but their validity or All languages in \n                    \n                      \n                    \n                    $$\n\\mathcal{N}\\mathcal{P}\n$$\n                   have zero-knowledge proofs,\u201d Technical Report 554, Technion (1989)."},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"S. Goldwasser and M. Sipser, \u201cPrivate coins versus public coins in interactive proof systems,\u201d Proc. 18th STOC, pp.59\u201368 (1986).","DOI":"10.1145\/12130.12137"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Burton S. Kaliski, Jr., \u201cA pseudo-random bit generator based on elliptic logarithms,\u201d Proc. CRYPT0\u201986, pp.84\u2013103 (1986).","DOI":"10.1007\/3-540-47721-7_7"},{"key":"29_CR13","unstructured":"Burton S. Kaliski, Jr., \u201cElliptic curves and cryptography: a pseudorandom bit generator and other tools,\u201d MIT\/LCS\/ TR-411, MIT (1988)."},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Neal Koblitz, \u201cElliptic curve cryptosystems,\u201d Math. Comp., vo1.48, no.177, pp.203\u2013209 (1987).","journal-title":"Math. Comp."},{"key":"29_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0310-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1987","unstructured":"Neal Koblitz, \u201cA Course in Number Theory and Cryptography,\u201d GTM114, Springer-Verlag, New York (1987)."},{"issue":"3","key":"29_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Neal Koblitz, \u201cHyperelliptic cryptosystems,\u201d J. Cryptology, vol.1, no.3, pp. 139\u2013150 (1989).","journal-title":"J. Cryptology"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Victor S. Miller, \u201cUse of elliptic curves in cryptography,\u201d Proc. CRYPT0\u201985, pp.417\u2013426 (1985).","DOI":"10.1007\/3-540-39799-X_31"},{"key":"29_CR18","unstructured":"Victor S. Miller, \u201cShort programs for functions on curves,\u201d manuscript (1986)."},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"A. Menezes, T. Okamoto, and S. Vanstone, \u201cReducing elliptic curve logarithms to logarithms in a finite field,\u201d announced at CRYPTO\u201990 rump session (1990) (to appear in Proc. STOC\u201991).","DOI":"10.1145\/103418.103434"},{"key":"29_CR20","unstructured":"T. Okamoto and K. Sakurai, \u201cOn the complexity of problems associated with hyperelliptic curves,\u201d Proc. SCIS91, 9C (1991)."},{"key":"29_CR21","unstructured":"Jonathan S. Pila, \u201cFrobenius maps of abelian varieties and finding roots of unity in finite fields,\u201d Ph.D Thesis, Stanford University (to appear in Math. Comp.) (1988)."},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1137\/0204018","volume":"4","author":"V. Pratt","year":"1975","unstructured":"Pratt, V., \u201cEvery Prime has a succinct certificate,\u201d SIAM J. COMPUT. vo1.4, pp.214\u2013220 (1975).","journal-title":"SIAM J. COMPUT."},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0022-0000(83)90027-2","volume":"27","author":"U. Sch\u00f6ning","year":"1983","unstructured":"Uwe Sch\u00f6ning, \u201cA low and high hierarchy within \n                    \n                      \n                    \n                    $$\n\\mathcal{N}\\mathcal{P}\n$$\n                  ,\u201d J. Comp. Syst. Sci., vo1.27, pp.14\u201328 (1983).","journal-title":"J. Comp. Syst. Sci."},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/0022-0000(88)90010-4","volume":"37","author":"U. Sch\u00f6ning","year":"1988","unstructured":"Uwe Sch\u00f6ning, \u201cGraph isomorphism is in the low hierarchy,\u201d J. Comp. Syet., vo1.37, pp.312\u2013323 (1988).","journal-title":"J. Comp. Syet."},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"483","DOI":"10.2307\/2007968","volume":"44","author":"R. Schoof","year":"1985","unstructured":"Ren\u00e9 Schoof, \u201cElliptic curves over finite field and the computation of square roots mod p,\u201d Math. Comp., vo1.44, pp.483\u2013494 (1985).","journal-title":"Math. Comp."},{"key":"29_CR26","unstructured":"Hiroki Shizuya, \u201cZero-knowledge interactive proofs for hyper-and ellipticdiscrete logarithm problems,\u201d Proc. WCIS\u201989, pp. 143\u2013152 (1989)."},{"issue":"7","key":"29_CR27","first-page":"1087","volume":"E-73","author":"H. Shieuya","year":"1990","unstructured":"H. Shieuya, and T. Itoh, \u201cA group-theoretic interface to random self-reducibility,\u201d Trans. IEICE, vol.E-73, no.7, pp.1087\u20131091 (1990).","journal-title":"Trans. IEICE"},{"key":"29_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J. H. Silverman","year":"1986","unstructured":"Joseph H. Silverman, \u201cThe Arithmetic of Elliptic Curves,\u201d GTM 106, Springer-Verlag, New York (1986)."},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll, \u201cRandom self-reducibility and zero knowledge interactive proofs for possession of information,\u201d Proc. 28th FOCS, pp.472\u2013482 (1987).","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:58:48Z","timestamp":1558274328000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540546207","9783540464167"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1991]]},"assertion":[{"value":"18 May 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}