{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:38Z","timestamp":1772283518549,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540573401","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_1","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"1-14","source":"Crossref","is-referenced-by-count":25,"title":["Provably Unforgeable Signatures"],"prefix":"10.1007","author":[{"given":"Jurjen N. E.","family":"Bos","sequence":"first","affiliation":[]},{"given":"David","family":"Chaum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"J. F. Boyar, D. Chaum, I. B. Damg\u00e5rd and T. Pedersen: Convertible Undeniable Signatures, Advances in Cryptology: Proc. Crypto\u2019 90 (Santa Barbara, CA, August 1990), to be published.","DOI":"10.7146\/dpb.v19i330.6719"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"E. F. Brickell and J. M. DeLaurentis: An Attack on a Signature Scheme proposed by Okamoto and Shiraishi, Advances in Cryptology: Proc. Crypto\u2019 85 (Santa Barbara, CA, August 1985), pp. 28\u201332.","DOI":"10.1007\/3-540-39799-X_4"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"T. Beth: A fiat-Shamir-like Authentication Protocol for the EIG amal Scheme, Advances in Cryptology: Proc. Eurocrypt\u2019 88 (Davos, Switzerland, May 1988), pp. 77\u201386.","DOI":"10.1007\/3-540-45961-8_7"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and S. Micali: How to Sign Given any Trapdoor Function, Advances in Cryptology: Proc. Crypto\u2019 88 (Santa Barbara, CA, August 1988), pp. 200\u2013215.","DOI":"10.1007\/0-387-34799-2_15"},{"key":"1_CR5","unstructured":"J. N. E. Bos: Practical Privacy, dissertation of the Eindhoven University of Technology, march 1992"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum and H. van Antwerpen: Undeniable Signatures, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 212\u2013216.","DOI":"10.1007\/0-387-34805-0_20"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum: Blind Signatures for Untraceable Payments, Advances in Cryptology: Proc. Crypto\u2019 82 (Santa Barbara, CA, August 1982), pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum: Zero-knowledge Undeniable Signatures, Advances in Cryptology: Proc. Eurocrypt\u2019 90 (\u00c5rhus, Denmark, May 1990), pp. 458\u2013464.","DOI":"10.1007\/3-540-46877-3_41"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"D. Chaum, E. van Heijst, and B. Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, Advances of Cryptology: Proc. Crypto\u2019 91 (Santa Barbara, August 1991), to be published.","DOI":"10.1007\/3-540-46766-1_38"},{"key":"1_CR10","unstructured":"D. Chaum and S. Roijakkers: Unconditionally Secure Digital Signatures, Advances in Cryptology: Proc. Crypto\u2019 90 (Santa Barbara, CA, August 1990), pp. 209\u2013217."},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D. E. R. Denning","year":"1984","unstructured":"D. E. R. Denning: Digital Signatures with RSA and Other Public-Key Cryptosystems, Comm. ACM 27 (No. 4, April 1984), pp. 388\u2013392.","journal-title":"Comm. ACM"},{"issue":"6","key":"1_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman: New Directions in Cryptography, IEEE Trans. Information Theory IT-22 (No. 6, November 1976), pp. 644\u2013654.","journal-title":"IEEE Trans. Information Theory"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"R. DeMillo, N. Lynch, and M. Merritt: Cryptographic Protocols, Proc. 14th ACM Symp. Theory of Computing (San Fransisco, CA, May 1982), pp. 383\u2013400.","DOI":"10.1145\/800070.802214"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"D. Estes, L. M. Adleman, K. Kompella, K. McCurley, and G. L. Miller: Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number fields, Advances in Cryptology: Proc. Crypto\u2019 85 (Santa Barbara, CA, August 1985), pp. 3\u201313.","DOI":"10.1007\/3-540-39799-X_1"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, and A. Lempel: A Randomized Protocol for Signing Contracts, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 205\u2013210.","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, and S. Micali: On-line\/Off-line Digital Signatures, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 263\u2013275","DOI":"10.1007\/0-387-34805-0_24"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"J-H. Evertse and E. van Heyst: Which RSA Signatures can be Computed from Some Given Signatures?, Advances in Cryptology: Proc. Eurocrypt\u2019 90 (\u00c5rhus, Denmark, May 1990), pp. 83\u201397.","DOI":"10.1007\/3-540-46877-3_8"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"J-H. Evertse and E. van Heyst: Which RSA Signatures can be Computed from Certain Given Signatures?, Report W 91-06, February 1991, Mathematical Institute, University of Leiden.","DOI":"10.1007\/3-540-46877-3_8"},{"issue":"4","key":"1_CR19","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm, IEEE Trans. Information Theory IT-31 (No. 4, July 1985), pp. 469\u2013472.","journal-title":"IEEE Trans. Information Theory"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"A. flat and A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems, Advances in Cryptology: Proc. Crypto\u2019 86, (Santa Barbara, CA, August 1986), pp. 186\u2013194.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest: A \u201cParadoxical\u201d Solution to the Signature Problem, Proc. 25th IEEE Symp. Foundations of Computer Science (Singer Island, 1984), pp. 441\u2013448.","DOI":"10.1109\/SFCS.1984.715946"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing 17 (No 2, April 1988), pp. 281\u2013308.","journal-title":"SIAM Journal on Computing"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and A. Yao: Strong Signature Schemes, Proc. 15th ACM Symp. Theory of Computing (Boston, MA, April 1983), pp. 431\u2013439.","DOI":"10.1145\/800061.808774"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"O. Goldreich: Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme, Advances in Cryptology: Proc. Crypto\u2019 86 (Santa Barbara, CA, August 1986), pp. 104\u2013110.","DOI":"10.1007\/3-540-47721-7_8"},{"key":"1_CR25","unstructured":"O. Goldreich: Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme, Report MIT\/LCS\/TM-315, Massachusetts Institute of Technology."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"B. Hayes: Anonymous One-Time Signatures and flexible Untraceable Electronic Cash, Advances in Cryptology: Proc. Auscrypt\u2019 90 (Sydney, Australia, January 1990), pp. 294\u2013305.","DOI":"10.1007\/BFb0030369"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/0304-3975(81)90034-7","volume":"16","author":"K. Lieberherr","year":"1981","unstructured":"K. Lieberherr: Uniform Complexity and Digital Signatures. Theoretical Computer Science 16 (1981), pp. 99\u2013110.","journal-title":"Theoretical Computer Science"},{"key":"1_CR28","unstructured":"U. Maurer: Non-interactive Public Key Cryptography, Advances in Cryptology: Proc. Eurocrypt\u2019 91 (Brighton, United Kingdom, April 1991), to be published."},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"R. C. Merkle: A Certified Digital Signature, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 218\u2013238.","DOI":"10.1007\/0-387-34805-0_21"},{"issue":"5","key":"1_CR30","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","volume":"IT-24","author":"R. C. Merkle","year":"1987","unstructured":"R. C. Merkle and M. E. Hellman: Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. Information Theory IT-24 (No. 5, September 1987), pp. 525\u2013530.","journal-title":"IEEE Trans. Information Theory"},{"issue":"8","key":"1_CR31","first-page":"342","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"T. Okamoto: A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystems, ACM Trans. Computer Systems 6 (No. 8, November 1988), pp. 342\u2013441.","journal-title":"ACM Trans. Computer Systems"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"T. Okamoto and A. Shiraishi: A Fast Signature Scheme Based on Quadratic Inequalities, Proc. 1985 Symp. Security and Privacy (Oakland, CA, April 1985), pp. 123\u2013132.","DOI":"10.1109\/SP.1985.10026"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"H. Ong, C. P. Schnorr, and A. Shamir: Efficient Signature Schemes based on Polynomial Equations, Advances in Cryptology: Proc. Crypto\u2019 84 (Santa Barbara, August 1984), pp. 37\u201346.","DOI":"10.1007\/3-540-39568-7_4"},{"key":"1_CR34","unstructured":"M. O. Rabin: Digitalized Signatures, Foundations of Secure Computations 1977 (Atlanta, GA, October 1977), pp. 155\u2013168."},{"key":"1_CR35","unstructured":"M. O. Rabin: Digitalized Signatures and Public-key Function as Intractable as Factorization, Report MIT\/LCS\/TR-212, Massachusetts Institute of Technology."},{"key":"1_CR36","unstructured":"P. J. N. de Rooij: On the security of the Schnorr Scheme using Preprocessing, Proc. Eurocrypt\u2019 91 (Brighton, United Kingdom), to be published."},{"issue":"2","key":"1_CR37","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and M. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Comm. ACM 21 (No 2, February 1978), pp. 120\u2013126.","journal-title":"Comm. ACM"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr: Efficient Identification and Signatures for Smart Cards, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 239\u2013251.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"1_CR39","unstructured":"A. Shamir: A Fast Signature Scheme, Report MIT\/LCS\/TR-107, Massachusetts Institute of Technology."},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"A. Shamir: A polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, Proc. 23rd IEEE Symp. Foundations of Computer Science (Chicago, IL, 1982), pp. 145\u2013152.","DOI":"10.1109\/SFCS.1982.5"},{"issue":"1","key":"1_CR41","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/357353.357357","volume":"1","author":"A. Shamir","year":"1983","unstructured":"A. Shamir: On the Generation of Cryptographically Strong Pseudorandom Sequences, ACM Trans. Computer Systems 1 (No. 1, February 1983), pp. 38\u201344.","journal-title":"ACM Trans. Computer Systems"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"A. Shamir: Identity-based Cryptosystems and Signature Schemes, Advances in Cryptology: Proc. Crypto\u2019 84 (Santa Barbara, CA, August 1984), pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"M. de Soete, J.-J. Quisquater, and K. Vledder: A Signature with Shared Verification Scheme, Advances in Cryptology: Proc. Crypto\u2019 89 (Santa Barbara, CA, August 1989), pp. 253\u2013262.","DOI":"10.1007\/0-387-34805-0_23"},{"key":"1_CR44","volume-title":"Fast Cryptoanalysis of a Fast Signature System","author":"Y. Tulpan","year":"1984","unstructured":"Y. Tulpan: Fast Cryptoanalysis of a Fast Signature System, Master\u2019s thesis in Applied Mathematics, Weizmann Institute, Israel, 1984."},{"issue":"6","key":"1_CR45","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"IT-26","author":"H. C. Williams","year":"1980","unstructured":"H. C. Williams, A Modification of the RSA Public-Key Encryption Procedure, IEEE Trans. Information Theory IT-26, (No. 6, November 1980), pp. 726\u2013729.","journal-title":"IEEE Trans. Information Theory"},{"issue":"3","key":"1_CR46","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0161-117991854025","volume":"3","author":"G. Yuval","year":"1979","unstructured":"G. Yuval: How to Swindle Rabin, Cryptologia 3 (No. 3, July 1979), pp. 187\u2013189.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:59:06Z","timestamp":1684000746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_1","relation":{},"subject":[]}}