{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:57Z","timestamp":1725488697449},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_8","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"96-105","source":"Crossref","is-referenced-by-count":2,"title":["Direct Zero Knowledge Proofs of Computational Power in Five Rounds"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"David","family":"Chaum","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"M. Abadi, E. Allender, A. Broder, F. Feigenbaum, and L. Hemachandra, \u201cOn Generating Solved Instances of Computational Problems,\u201d the Proceedings of Crypto (1988)"},{"key":"8_CR2","unstructured":"J. Brandt, I. Damg\u00e5rd, P. Landrock, T. Pedersen, \u201cZero-Knowledge Authentication Scheme with Secret Key Exchange,\u201d (Preprint)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Micali, and R. Ostrovsky, \u201cPerfect Zero-Knowledge in Constant Rounds,\u201d the Proceedings of STOC, pp.482\u2013493 (1990)","DOI":"10.1145\/100216.100283"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Shamir, \u201cZero-Knowledge Proofs of Knowledge in Two Rounds,\u201d the Proceedings of Crypto\u201989, pp.526\u2013544 (1989)","DOI":"10.1007\/0-387-34805-0_46"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Fiat and A. Shamir, \u201cZero Knowledge Proofs of Identity,\u201d the Proceedings of STOC, pp.210\u2013217 (1987)","DOI":"10.1145\/28395.28419"},{"key":"8_CR6","unstructured":"A. Fiat and A. Shamir, \u201cHow to Prove Yourself,\u201d the Proceedings of Crypto (1986)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, \u201cProbabilistic Encryption,\u201d Journal of Computer and System Science, pp270\u2013299 (1984)","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, \u201cKnowledge Complexity of Interactive Proofs,\u201d the Proceedings of STOC, pp291\u2013304 (1985)","DOI":"10.1145\/22145.22178"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, \u201cProofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design,\u201d the Proceedings of FOCS, pp.174\u2013187 (1986)","DOI":"10.1109\/SFCS.1986.47"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"J. H\u00e5stad, \u201cPseudo-Random Generators under Uniform Assumptions,\u201d the Proceedings of STOC, pp.395\u2013404 (1990)","DOI":"10.1145\/100216.100270"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo, L. Levin, M. Luby \u201cPseudo-Random Number Generation from One-Way Functions,\u201d the Proceedings of STOC, pp.12\u201324 (1989)","DOI":"10.1145\/73007.73009"},{"key":"8_CR12","unstructured":"K. Kurosawa, \u201cDual Zero Knowledge Interactive Proof Systems,\u201d Technical Report of the IEICE. Japan, ISEC88-33 (1988)"},{"key":"8_CR13","unstructured":"T. Okamoto, and K. Ohta, \u201cZero Knowledge Proofs for Possession of Blackboxes,\u201d SCIS\u201989 (in Japan) (1989)"},{"key":"8_CR14","unstructured":"M. Naor, \u201cBit Commitment Using Pseudo-Randomness,\u201d the Proceedings of Crypto\u201989 (1989)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll, \u201cRandom Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information,\u201d the Proceedings of FOCS, pp.472\u2013482 (1987)","DOI":"10.1109\/SFCS.1987.49"},{"key":"8_CR16","unstructured":"M. Yung, \u201cZero-Knowledge Profs of Computational Power,\u201d the Proceedings of Eurocrypt\u201989, (1989)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:39Z","timestamp":1605647499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_8","relation":{},"subject":[]}}