{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:36:01Z","timestamp":1771702561904,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_42","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"490-497","source":"Crossref","is-referenced-by-count":239,"title":["Self-certified public keys"],"prefix":"10.1007","author":[{"given":"Marc","family":"Girault","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-45961-8_7","volume-title":"Advances in Cryptology, Proc. of EUROCRYPT\u201988","author":"T. Beth","year":"1988","unstructured":"T. Beth, \u201cA Fiat-Shamir-like authentication protocol for the ElGamal scheme\u201d, Advances in Cryptology, Proc. of EUROCRYPT\u201988, LNCS 330, Springer-Verlag, 1988, pp. 77\u201386."},{"key":"42_CR2","unstructured":"\u201cThe Directory-Authentication Framework\u201d, CCITT Recommendation X509."},{"key":"42_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography\u201d, IEEE Transactions on Information Theory, Vol.IT-22, Nov.1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"42_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology, Proc. of CRYPTO\u201984","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms\u201d, Advances in Cryptology, Proc. of CRYPTO\u201984, LNCS 196, Springer-Verlag, 1985, pp.10\u201318."},{"key":"42_CR5","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology, Proc. of CRYPTO\u201986","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir, \u201cHow to prove yourself: Practical solutions to identification and signature problems\u201d, Advances in Cryptology, Proc. of CRYPTO\u201986, LNCS 263, Springer-Verlag, 1987, pp. 186\u2013194."},{"key":"42_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/3-540-46877-3_44","volume-title":"Proc. of EUROCRYPT\u201990","author":"M. Girault","year":"1991","unstructured":"M. Girault, \u201cAn identity-based identification scheme based on discrete logarithms modulo a composite number\u201d, Proc. of EUROCRYPT\u201990, LNCS 473, Springer-Verlag, 1991, pp.481\u2013486."},{"key":"42_CR7","unstructured":"M. Girault and JC. Paill\u00e8s, \u201cAn identity-based identification scheme providing zero-knowledge authentication and authenticated key exchange\u201d, Proc. of ESORICS\u201990, pp.173\u2013184."},{"key":"42_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology, Proc. of EUROCRYPT\u201988","author":"L.C. Guillou","year":"1988","unstructured":"L.C. Guillou and J.J. Quisquater, \u201cA practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory\u201d, Advances in Cryptology, Proc. of EUROCRYPT\u201988, LNCS 330, Springer-Verlag, 1988, pp.123\u2013128."},{"key":"42_CR9","unstructured":"P. Horster and H.J. Knobloch, \u201cDiscrete logarithm based protocols\u201d, these Proceedings."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, \u201cHow to utilize the randomness of zero-knowledge proofs\u201d, Proc. of CRYPTO\u201990, to appear.","DOI":"10.1007\/3-540-38424-3_33"},{"key":"42_CR11","unstructured":"J.C. Paill\u00e8s and M. Girault, \u201cCRIPT: A public-key based solution for secure data communications\u201d, Proc. of SECURICOM\u201989, pp.171\u2013185."},{"key":"42_CR12","unstructured":"M.O Rabin, \u201cDigitalized signatures and public-key functions as intractable as factorization\u201d, MIT, Lab. for Computer Science, MIT\/LCS\/TR-212, Jan.1979."},{"key":"42_CR13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, CACM, Vol.21, no2, Feb.1978, pp.120\u2013126.","journal-title":"CACM"},{"key":"42_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology, Proc. of CRYPTO\u201989","author":"C.P. Schnorr","year":"1990","unstructured":"C.P. Schnorr, \u201cEfficient identification and signatures for smart cards\u201d, Advances in Cryptology, Proc. of CRYPTO\u201989, LNCS 435, Springer-Verlag, pp.239\u2013252."},{"key":"42_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology, Proc. of CRYPTO\u201984","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, \u201cIdentity-based cryptosystems and signature schemes\u201d, Advances in Cryptology, Proc. of CRYPTO\u201984, LNCS 196, Springer-Verlag, 1985, pp.47\u201353."},{"key":"42_CR16","unstructured":"K. Tanaka and E. Okamoto, \u201cKey distribution system using ID-related information directory suitable for mail systems\u201d, Proc. of SECURICOM\u201990, pp.115\u2013122."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:34Z","timestamp":1605647494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_42","relation":{},"subject":[]}}