{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:11Z","timestamp":1725488651450},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_34","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"420-428","source":"Crossref","is-referenced-by-count":1,"title":["How Intractable Is the Discrete Logarithm for a General Finite Group?"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Shizuya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"W. Aiello, J. H\u00e5stad, \u201cPerfect zero-knowledge languages can be recognized in two rounds,\u201d Proc. 28th FOCS, pp. 439\u2013448 (1987).","DOI":"10.1109\/SFCS.1987.47"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/0020-0190(87)90232-8","volume":"25","author":"R. Boppana","year":"1987","unstructured":"R. Boppana, J. H\u00e5stad, and S. Zachos, \u201cDoes co-NP have short interactive proofs?\u201d Inform. Proc. Lett., vol.25, pp.127\u2013132 (1987).","journal-title":"Inform. Proc. Lett."},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TIT.1979.1056010","volume":"IT-25","author":"G. Brassard","year":"1979","unstructured":"G. Brassard, \u201cA note on the complexity of cryptography,\u201d IEEE Trans. Inf. Theory, vol.IT-25, no.2, pp.232\u2013233 (1979).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"L. J. Fortnow, \u201cThe complexity of perfect zero-knowledge,\u201d Proc. 19th STOC, pp.204\u2013209 (1987).","DOI":"10.1145\/28395.28418"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"S. Goldwasser and M. Sipser, \u201cPrivate coins versus public coins in interactive proof systems,\u201d Proc. 18th STOC, pp.59\u201368 (1986).","DOI":"10.1145\/12130.12137"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/BF02088291","volume":"22","author":"A. Klapper","year":"1989","unstructured":"A. Klapper, \u201cGeneralized lowness and highness and probabilistic complexity classes,\u201d Math. Syst. Theory, vol.22, pp.37\u201345 (1989).","journal-title":"Math. Syst. Theory"},{"issue":"177","key":"34_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, \u201cElliptic curve cryptosystems,\u201d Math. Comp., vol.48, no.177, pp.203\u2013209 (1987).","journal-title":"Math. Comp."},{"issue":"3","key":"34_CR8","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"N. Koblitz, \u201cHyperelliptic cryptosystems,\u201d J. Cryptology, vol.1, no.3, pp.139\u2013150 (1989).","journal-title":"J. Cryptology"},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology: Proceedings of Crypto\u2019 85","author":"V. S. Miller","year":"1985","unstructured":"V. S. Miller, \u201cUse of elliptic curves in cryptography,\u201d Advances in Cryptology: Proceedings of Crypto\u2019 85, LNCS 218, pp.417\u2013426 (1985)."},{"key":"34_CR10","series-title":"Lect Notes Comput Sci","first-page":"265","volume-title":"Advances in Cryptology: Proceedings of Crypto\u2019 91","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto, K. Sakurai, \u201cEfficient algorithms for the construction of hyperelliptic cryptosystems,\u201d Advances in Cryptology: Proceedings of Crypto\u2019 91, LNCS 576, Springer-Verlag, pp.265\u2013278 (1992)."},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1137\/0204018","volume":"4","author":"V. R. Pratt","year":"1975","unstructured":"V. R. Pratt, \u201cEvery prime has a succinct certificate,\u201d SIAM J. Comput., vol.4, pp.214\u2013220 (1975).","journal-title":"SIAM J. Comput."},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0022-0000(83)90027-2","volume":"27","author":"U. Sch\u00f6ning","year":"1983","unstructured":"U. Sch\u00f6ning, \u201cA low and high hierarchy within NP,\u201d J. Comp. Syst. Sci., vol.27, pp.14\u201328 (1983).","journal-title":"J. Comp. Syst. Sci."},{"key":"34_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/3-540-46416-6_29","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt\u2019 91","author":"H. Shizuya","year":"1991","unstructured":"H. Shizuya, T. Itoh, K. Sakurai, \u201cOn the complexity of hyperelliptic discrete logarithm problem\u201d, Advances in Cryptology: Proceedings of Eurocrypt\u2019 91, LNCS 547, Springer-Verlag, pp.337\u2013351 (1991)."},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll, \u201cRandom self-reducibility and zero knowledge interactive proofs of possession of information,\u201d Proc. 28th FOCS, pp. 472\u2013482 (1987).","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:14:01Z","timestamp":1605647641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_34","relation":{},"subject":[]}}