{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:14Z","timestamp":1725488654489},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_37","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"449-453","source":"Crossref","is-referenced-by-count":8,"title":["Secure Conference Key Distribution Schemes for Conspiracy Attack"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Koyama","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"D. Beaver: \u201cFoundations of Secure Interactive Computing\u201d, Proc. of CRYPTO\u201991, pp.9-1\u20139-7 (1991)."},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"T. Chikazawa and T. Inoue: \u201cA new key sharing system for global telecommunications\u201d, Proc. of GLOBCOM\u201990, pp.1069\u20131072 (1990).","DOI":"10.1109\/GLOCOM.1990.116666"},{"key":"37_CR3","unstructured":"W. Fumy and M. Munzert: \u201cA modular approach to key distribution\u201d, Proc. of CRYPTO\u201990, pp.274\u2013283 (1990)."},{"key":"37_CR4","unstructured":"A. Fiat and A. Shamir: \u201cHow to prove yourself: Practical solutions to identification and signature problems\u201d, Proc. of CRYPTO\u201986, pp.186\u2013194 (1986)."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Fiat and A. Shamir: \u201cZero knowledge proofs of identity\u201d, Proc. of STOC, pp.210\u2013217 (1987).","DOI":"10.1145\/28395.28419"},{"key":"37_CR6","unstructured":"L.C. Guillou and J. J. Quisquarter: \u201cA practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory\u201d, Proc. of Eurocrypt\u201988, pp.123\u2013128 (1990)."},{"key":"37_CR7","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"IT-28","author":"I. Ingemarson","year":"1982","unstructured":"I. Ingemarson, D.T. Tang and C.K. Wong: \u201cA conference key distribution system\u201d, IEEE Trans. on Information Theory, Vol. IT-28, pp.714\u2013720, (1982).","journal-title":"IEEE Trans. on Information Theory"},{"key":"37_CR8","unstructured":"K. Koyama and K. Ohta: \u201cSecurity of Improved Identity-based Conference Key Distribution Systems\u201d, Proc. of Eurocrypt\u201988, pp.11\u201319 (1989)."},{"issue":"3","key":"37_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0190(89)90008-2","volume":"32","author":"C.S. Laih","year":"1989","unstructured":"C.S. Laih, J.Y. Lee and L. Harn: \u201cA new threshold scheme and its application in designing the conference key distribution cryptosystem\u201d, Information Processing Letters, Vol.32, No.3, pp.95\u201399 (1989).","journal-title":"Information Processing Letters"},{"issue":"2","key":"37_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. McCurley","year":"1988","unstructured":"K.S. McCurley: \u201cA key distribution system equivalent to factoring\u201d, J. of Cryptology, Vol.1, No. 2, pp.95\u2013106, (1988).","journal-title":"J. of Cryptology"},{"key":"37_CR11","unstructured":"S. Micali and P. Rogaway: \u201cSecure computation\u201d, Proc. of CRYPTO\u201991, p9\u20138 (1991)."},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1049\/el:19860880","volume":"22","author":"E. Okamoto","year":"1986","unstructured":"E. Okamoto: \u201cProposal for identity-based key distribution systems\u201d, Electronics Letters Vol.22 pp.1283\u20131284 (1986).","journal-title":"Electronics Letters"},{"key":"37_CR13","unstructured":"K. Ohta and T. Okamoto: \u201cA modification of the Fiat-Shamir scheme\u201d, Proc. of CRYPTO\u201988, pp.232\u2013243 (1988)."},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/0161-118391857900","volume":"2","author":"G. J. Simmons","year":"1983","unstructured":"G. J. Simmons: \u201cA \u2018weak\u2019 privacy protocol using the RSA crypto algorithm\u201d, Cryptologia 7, 2, pp.180\u2013182 (1983).","journal-title":"Cryptologia 7"},{"key":"37_CR15","unstructured":"Z. Shmuely: \u201cComposite Diffie-Hellman public-key generating systems are hard to break\u201d, TR. NO. 356, Computer Science Dept. Technion, IIT, Feb. (1985)."},{"key":"37_CR16","unstructured":"A. Simbo and S. Kawamura \u201cCryptanalysis of several conference key distribution schemes\u201d, Proc. of Asiacrypt\u201991, pp.155\u2013160 (1991)."},{"key":"37_CR17","unstructured":"Y. Yacobi: \u201cA key distribution \u201cparadox\u201d\u201d, Proc. of CRYPTO\u201990, pp.268\u2013273 (1990)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:49:25Z","timestamp":1619570965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_37","relation":{},"subject":[]}}