{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:18:43Z","timestamp":1772893123909,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_43","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"498-507","source":"Crossref","is-referenced-by-count":69,"title":["Non-interactive Public-Key Cryptography"],"prefix":"10.1007","author":[{"given":"Ueli M.","family":"Maurer","sequence":"first","affiliation":[]},{"given":"Yacov","family":"Yacobi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith, A.M. Odlyzko and R. Schroeppel, Discrete Logarithms in GF(p), Algorithmica, vol. 1, pp. 1\u201315, 1986.","journal-title":"Algorithmica"},{"key":"43_CR2","first-page":"664","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT-22, pp. 664\u2013654, Nov. 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"43_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol. IT-31, pp. 469\u2013472, July 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"43_CR4","unstructured":"M. Girault, Self-certified public keys, these proceedings."},{"key":"43_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 89","author":"C.G. G\u00fcnther","year":"1990","unstructured":"C.G. G\u00fcnther, An identity-based key-exchange protocol, Advances in Cryptology-EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, Berlin: Springer Verlag, pp. 29\u201337, 1990."},{"key":"43_CR6","unstructured":"L. Kohnfelder, Towards a practical public-key cryptosystem, B.S. Thesis, MIT, 1979."},{"key":"43_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-48184-2_13","volume-title":"Advances in Cryptology-CRYPTO\u2019 87","author":"K. Koyama","year":"1988","unstructured":"K. Koyama and K. Ohta, Identity-based conference key distribution systems, Advances in Cryptology-CRYPTO\u2019 87, Lecture Notes in Computer Science, vol. 293, Berlin: Springer Verlag, pp. 175\u2013184, 1988."},{"key":"43_CR8","unstructured":"A.K. Lenstra, personal communication, 1991."},{"key":"43_CR9","series-title":"Lect Notes Comput Sci","first-page":"69","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 90","author":"A.K. Lenstra","year":"1991","unstructured":"A.K. Lenstra and M.S. Manasse, Factoring with two large primes, Advances in Cryptology-EUROCRYPT\u2019 90, Lecture Notes in Computer Science, vol. 473, Berlin: Springer Verlag, pp. 69\u201380, 1991."},{"key":"43_CR10","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H.W. Lenstra","year":"1987","unstructured":"H.W. Lenstra, Factoring integers with elliptic curves, Annals of Mathematics, vol. 126, pp. 649\u2013673, 1987.","journal-title":"Annals of Mathematics"},{"key":"43_CR11","unstructured":"A.K. Lenstra, H.W. Lenstra, M.S. Manasse and J.M. Pollard, The number field sieve, to appear."},{"key":"43_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-46885-4_35","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 89","author":"A.K. Lenstra","year":"1990","unstructured":"A.K. Lenstra and M.S. Manasse, Factoring with electronic mail, Advances in Cryptology-EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, Berlin: Springer Verlag, pp. 355\u2013371, 1990."},{"key":"43_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology-CRYPTO\u2019 87","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai, On the key predistribution system: a practical solution to the key distribution problem, Advances in Cryptology-CRYPTO\u2019 87, Lecture Notes in Computer Science, vol. 293, Berlin: Springer Verlag, pp. 185\u2013193, 1988."},{"key":"43_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1007\/3-540-46885-4_60","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 89","author":"U.M. Maurer","year":"1990","unstructured":"U.M. Maurer, Fast generation of secure RSA-moduli with almost maximal diversity, Advances in Cryptology-EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, Berlin: Springer Verlag, pp. 636\u2013647, 1990."},{"key":"43_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. McCurley","year":"1988","unstructured":"K.S. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology, vol. 1, no. 2, pp. 95\u2013106, 1988.","journal-title":"Journal of Cryptology"},{"key":"43_CR16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G.L. Miller","year":"1976","unstructured":"G.L. Miller, Riemann\u2019s hypothesis and tests for primality, Journal of Computer and System Sciences, vol. 13, pp. 300\u2013317, 1976.","journal-title":"Journal of Computer and System Sciences"},{"key":"43_CR17","unstructured":"Y. Murakami and M. Kasahara, An ID-based key distribution system, Proc. of ISEC90, pp. 33\u201340, 1990 (in Japanese)."},{"key":"43_CR18","unstructured":"A.M. Odlyzko, personal communications, 1990\u201391."},{"key":"43_CR19","unstructured":"T. Okamoto and K. Ohta, How to utilize the randomness of zero-knowledge proofs, presented at CRYPTO\u201990 (to appear in the proceedings), Santa Barbara, CA, Aug. 11\u201315, 1990."},{"issue":"4","key":"43_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/49.17711","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"E. Okamoto and K. Tanaka, Key distribution based on identification information, IEEE Journal on Selected Areas in Communications, vol. 7, no. 4, pp. 481\u2013485, May 1989.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"43_CR21","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S.C. Pohlig","year":"1978","unstructured":"S.C. Pohlig and M.E. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transactions on Information Theory, vol IT-24, pp. 106\u2013110, Jan. 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"43_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1017\/S0305004100049252","volume":"76","author":"J.M. Pollard","year":"1974","unstructured":"J.M. Pollard, Theorems on factorization and primality testing, Proc. Cambridge Philos. Society, vol. 76, pp. 521\u2013528, 1974.","journal-title":"Proc. Cambridge Philos. Society"},{"key":"43_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"43_CR24","doi-asserted-by":"publisher","first-page":"483","DOI":"10.2307\/2007968","volume":"44","author":"R.J. Schoof","year":"1985","unstructured":"R.J. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Mathematics of Computation, vol. 44, pp. 483\u2013494, 1985.","journal-title":"Mathematics of Computation"},{"key":"43_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology-CRYPTO\u2019 84","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-CRYPTO\u2019 84, Lecture Notes in Computer Science, vol. 196, Berlin: Springer Verlag, pp. 47\u201353, 1985."},{"key":"43_CR26","unstructured":"Z. Shmuely, Composite Diffie-Hellman public-key generating systems are hard to break, TR 356, CS Dept., Technion, Feb. 1985."},{"issue":"4","key":"43_CR27","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/49.17709","volume":"7","author":"S. Tsujii","year":"1989","unstructured":"S. Tsujii and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal on Selected Areas in Communications, vol. 7, no. 4, pp. 467\u2013473, May 1989.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"43_CR28","unstructured":"Y. Yacobi, A key distribution \u201cparadox\u201d, presented at CRYPTO\u201990 (to appear in the proceedings), Santa Barbara, CA, Aug. 11\u201315, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:34Z","timestamp":1605647494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_43","relation":{},"subject":[]}}