{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:03:29Z","timestamp":1778789009636,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_37","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"457-469","source":"Crossref","is-referenced-by-count":208,"title":["Shared generation of authenticators and signatures"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]},{"given":"Yair","family":"Frankel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"B. Blakley and G. R. Blakley. Security of number theoretic public key cryptosystems against random attack. Cryptologia, 1978. In three parts: Part I: 2 (4), pp. 305\u2013321, October 1978; Part II: 3(1), pp. 29\u201342, January 1979; Part III: 3(2), pp. 105\u2013118, April 1979.","DOI":"10.1080\/0161-117891853162"},{"issue":"3","key":"37_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/0898-1221(79)90039-7","volume":"5","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley and I. Borosh. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers & Mathematics with Apllications, 5(3):169\u2013178, 1979.","journal-title":"Computers & Mathematics with Apllications"},{"key":"37_CR3","series-title":"Lect Notes Comput Sci","first-page":"251","volume-title":"Advances in Cryptology, Proc. of Crypto\u201986","author":"J. C. Benaloh","year":"1987","unstructured":"J. C. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u201986 (Lecture Notes in Computer Science 263), pages 251\u2013260. Springer-Verlag, 1987. Santa Barbara, California, U.S.A., August 11\u201315."},{"key":"37_CR4","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley. Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc., pages 313\u2013317, 1979. vol.48.","journal-title":"Proc. Nat. Computer Conf. AFIPS Conf. Proc."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"G. R. Blakley and L. Swanson. Infinite structures in information theory. In D. Chaum, R.L. Rivest, and A. T. Sherman, editors, Advances in Cryptology. Proc. of Crypto\u201982, pages 39\u201350. Plenum Press N. Y., 1983. Crypto\u201982, Santa Barbara, CA, August 1982.","DOI":"10.1007\/978-1-4757-0602-4_4"},{"key":"37_CR6","first-page":"189","volume-title":"Cryptography and coding","author":"R. A. Croft","year":"1989","unstructured":"R. A. Croft and S. P. Harris. Public-key cryptography and re-usable shared secrets. In H. Beker and F. Piper, editors, Cryptography and coding, pages 189\u2013201. Clarendon Press, 1989. Royal Agricultural College, Cirencester, December 15\u201317, 1986."},{"key":"37_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/0-387-34805-0_27","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings","author":"B. Chor","year":"1990","unstructured":"B. Chor and E. Kushilevitz. Secret sharing over infinite domains. In G. Brassard, editor, Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings (Lecture Notes in Computer Science 435), pages 299\u2013306. Springer-Verlag, 1990. Santa Barbara, California, U.S.A., August 20\u201324."},{"key":"37_CR8","unstructured":"G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Tech. Report TR-CS-82-2, University of Wisconsin-Milwaukee, October 1982."},{"key":"37_CR9","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D. E. R. Denning","year":"1984","unstructured":"D. E. R. Denning. Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27, pages 388\u2013392, 1984.","journal-title":"Comm. ACM"},{"key":"37_CR10","unstructured":"Y. Desmedt. Abuse-free cryptosystems: Particularly subliminal-free authentication and signature. Submitted to the Journal of Cryptology, under revision, April 1989."},{"key":"37_CR11","unstructured":"Y. Desmedt and Y. Frankel. Unconditionally secure threshold authentication. In preparation (Available from authors when completed)."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel. Threshold cryptosystems. Santa Barbara, California, U.S.A., August 20\u201324, 1990.","DOI":"10.1007\/0-387-34805-0_28"},{"key":"37_CR13","unstructured":"Y. Desmedt and Y. Frankel. Perfect zero-knowledge sharing schemes over any finite Abelian group. Presented at Sequences\u2019 91, June 17\u201322, 1991, Positano, Italy, to appear in: the Proceedings Springer-Verlag, 1991."},{"issue":"6","key":"37_CR14","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"37_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-39799-X_3","volume-title":"Advances in Cryptology: Crypto\u2019 85, Proceedings","author":"W. Jonge de","year":"1986","unstructured":"W. de Jonge and D. Chaum. Attacks on some RSA signatures. In Advances in Cryptology: Crypto\u2019 85, Proceedings (Lecture Notes in Computer Science 218), pages 18\u201327. Springer-Verlag, New York, 1986. Santa Barbara, California, U.S.A., August 18\u201322, 1985."},{"key":"37_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/0-387-34805-0_23","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings","author":"M. Soete De","year":"1990","unstructured":"M. De Soete, J.-J. Quisquater, and K. Vedder. A signature with shared verification scheme. In G. Brassard, editor, Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings (Lecture Notes in Computer Science 435), pages 253\u2013262. Springer-Verlag, 1990. Santa Barbara, California, U.S.A., August 20\u201324."},{"key":"37_CR17","volume-title":"Information theory and reliable communication","author":"R. G. Gallager","year":"1968","unstructured":"R. G. Gallager. Information theory and reliable communication. John Wiley and Sons, New York, 1968."},{"issue":"2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2):281\u2013308, April 1988.","journal-title":"Siam J. Comput."},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth ACM Symp. Theory of Computing, STOC, pages 218\u2013229, May 25\u201327, 1987.","DOI":"10.1145\/28395.28420"},{"key":"37_CR20","series-title":"Lect Notes Comput Sci","first-page":"104","volume-title":"Advances in Cryptology, Proc. of Crypto\u201986","author":"O. Goldreich","year":"1987","unstructured":"O. Goldreich. Two remarks concerning the Goldwasser-Micali-Rivest signature scheme. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u201986 (Lecture Notes in Computer Science 263), pages 104\u2013110. Springer-Verlag, 1987. Santa Barbara, California, U.S.A., August 11\u201315, 1986."},{"key":"37_CR21","unstructured":"N. Jacobson. Basic Algebra I, volume 1. W. H. Freeman and Company, 2nd edition, 1985."},{"key":"37_CR22","unstructured":"N. Jacobson. Basic Algebra II, volume 2. W. H. Freeman and Company, 2nd edition, 1989."},{"key":"37_CR23","volume-title":"The Art of Computer Programming, Vol. 2, Seminumerical Algorithms","author":"D. E. Knuth","year":"1981","unstructured":"D. E. Knuth. The Art of Computer Programming, Vol. 2, Seminumerical Algorithms. Addison-Wesley, Reading, MA, 1981."},{"issue":"5","key":"37_CR24","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J. H. Moore","year":"1988","unstructured":"J. H. Moore. Protocol failures in cryptosystems. Proc. IEEE, 76(5):594\u2013602, May 1988.","journal-title":"Proc. IEEE"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"A. Menezes, S. Vanstone, and T. Okamoto. Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the Twenty third annual ACM Symp. Theory of Computing, STOC, pages 80\u201389, 1991.","DOI":"10.1145\/103418.103434"},{"key":"37_CR26","series-title":"Lect Notes Comput Sci","first-page":"224","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u201984","author":"A. M. Odlyzko","year":"1984","unstructured":"A. M. Odlyzko. Discrete logs in a finite field and their cryptographic significance. In N. Cot T. Beth and I. Ingemarsson. editors, Advances in Cryptology, Proc. of Eurocrypt\u201984 (Lecture Notes in Computer Science 209), pages 224\u2013314. Springer-Verlag, 1984. Paris, France April 1984."},{"key":"37_CR27","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21:294\u2013299, April 1978.","journal-title":"Commun. ACM"},{"key":"37_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Commun. ACM, 22:612\u2013613, November 1979.","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:35Z","timestamp":1605647615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_37","relation":{},"subject":[]}}