{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:47Z","timestamp":1725488327080},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_17","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"246-259","source":"Crossref","is-referenced-by-count":3,"title":["On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Sakurai","sequence":"first","affiliation":[]},{"given":"Toshiya","family":"Itoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-46885-4_20","volume-title":"Advances in Cryptology \u2014 Eurocrypto\u2019 89","author":"G. Brassard","year":"1990","unstructured":"Brassard, G. and Cr\u00e9peau, C., \u201cSorting out zero-knowledge,\u201d Advances in Cryptology \u2014 Eurocrypto\u2019 89, Lecture Notes in Computer Science 434, Springer-Verlag, Berlin, pp.181\u2013191 (1990)."},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., and Cr\u00e9peau, C., \u201cMinimum Disclosure Proofs of Knowledge,\u201d Journal of Computer and System Sciences, Vol.37, No.2, pp.156\u2013189 (October 1988).","journal-title":"Journal of Computer and System Sciences"},{"key":"17_CR3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"Brickell, E. F. and McCurley, K.S \u201cAn Interactive Identification Scheme Based on Discrete Logarithms and Factoring,\u201d Journal of Cryptology, Vol.5, pp.29\u201340 (1992).","journal-title":"Journal of Cryptology"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Micali, S., and Ostrovsky, R., \u201cPerfect Zero-Knowledge in Constant Rounds,\u201d ACM Annual Symposium on Theory of Computing, pp.482\u2013493 (May 1990).","DOI":"10.1145\/100216.100283"},{"key":"17_CR5","series-title":"Lect Notes Comput Sci","first-page":"212","volume-title":"Advances in Cryptology \u2014 Crypto\u201989","author":"D. Chaum","year":"1989","unstructured":"Chaum, D. and van Antwerpen, H \u201cUndeniable Signatures,\u201d Advances in Cryptology \u2014 Crypto\u201989, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.212\u2013216 (1989)."},{"key":"17_CR6","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology \u2014 Crypto\u201982","author":"D. Chaum","year":"1983","unstructured":"Chaum, D., \u201cBlind signature for Untraceable Payments,\u201d Advances in Cryptology \u2014 Crypto\u201982, Plenum Press, New York, pp.199\u2013203 (1983)."},{"key":"17_CR7","unstructured":"Desmedt, Y., \u201cMajor security problems with the \u201cunforgeable\u201d (Feige-) Fiat-Shamir proofs of identity and how to overcome them,\u201d In Securicom 88, 6th worldwide congress on computer and communications security and protection, pp.147\u2013159, (March 1988)."},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology \u2014 Crypto\u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y., Goutier, C. and Bengio, S.: \u201cSpecial Uses and abuses of the Fiat-Shamir Passport Protocol,\u201d Advances in Cryptology \u2014 Crypto\u201987, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, pp.21\u201339 (1988)."},{"issue":"6","key":"17_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M. \u201cNew Directions in Cryptology\u201d, IEEE Trans. on Info. Technology, vol. IT-22,6 (1976) pp.644\u2013654 (1976).","journal-title":"IEEE Trans. on Info. Technology"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Feige, U. and Shamir, A., \u201cWitness Indistinguishable and Witness Hiding Protocols,\u201d ACM Annual Symposium on Theory of Computing, pp.416\u2013426 (May 1990).","DOI":"10.1145\/100216.100272"},{"key":"17_CR11","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology \u2014 Crypto\u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A. and Shamir, A., \u201cHow to Prove Yourself,\u201d Advances in Cryptology \u2014 Crypto\u201986, Lecture Notes in Computer Science 263, Springer-Verlag, Berlin, pp.186\u2013199 (1987)."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Feige, U., Fiat, A., and Shamir, A., \u201cZero-Knowledge Proofs of Identity,\u201d ACM Annual Symposium on Theory of Computing, pp.210\u2013217 (May 1988), the final version: Journal of Cryptology, Vol.1, pp.179\u2013194 (1988). v","DOI":"10.1007\/BF02351717"},{"key":"17_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/BFb0032038","volume-title":"ICALP\u201990","author":"O. Goldreich","year":"1990","unstructured":"Goldreich, O. and Krawczyk, H., \u201cOn the Composition of Zero-Knowledge Proof Systems,\u201d ICALP\u201990, Lecture Notes in Computer Science 443, Springer-Verlag, Berlin, pp.268\u2013282 (1990)."},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., and Rackoff, C., \u201cThe Knowledge Complexity of Interactive Proof Systems,\u201d SIAM Journal of Computing, Vol.18, No.1, pp.186\u2013208 (February 1989).","journal-title":"SIAM Journal of Computing"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., and Wigderson, A., \u201cProofs that Yield Nothing But Their Validity and a Methodology of Cryptographic Protocol Design,\u201d IEEE Annual Symposium on Foundations of Computer Science, pp.174\u2013187 (October 1986).","DOI":"10.1109\/SFCS.1986.47"},{"key":"17_CR16","series-title":"Technical Report","volume-title":"Definitions and Properties of Zero-Knowledge Proof Systems","author":"O. Goldreich","year":"1990","unstructured":"Goldreich, O. and Oren, Y., \u201cDefinitions and Properties of Zero-Knowledge Proof Systems,\u201d Technical Report #610, Technion \u2014 Israel Institute of Technology, Department of Computer Science, Haifa, Israel (February 1990)."},{"key":"17_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u201988","author":"L.C. Guillou","year":"1988","unstructured":"Guillou, L.C., and Quisquater, J.J, \u201cA Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory,\u201d Advances in Cryptology \u2014 Eurocrypt\u201988, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.123\u2013128 (1988)."},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology \u2014 Crypto\u201988","author":"L.C. Guillou","year":"1990","unstructured":"L.C. Guillou, and J.J. Quisquater, \u201cA \u201cParadoxical\u201d Identity-Based Signature Scheme Resulting from Zero-Knowledge,\u201d Advances in Cryptology \u2014 Crypto\u201988, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, pp.216\u2013231 (1990)."},{"key":"17_CR19","unstructured":"International Standard, \u201cBanking \u2014 Approved algorithm for message authentication \u2014,\u201d ISO 8731-1 (1987)."},{"key":"17_CR20","unstructured":"Okamoto, T., \u201cProvably Secure and Practical Identification Schemes and Corresponding Signature Schemes,\u201d Entenxed Abstract for CRYPTO\u201992 (1992)."},{"key":"17_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/0-387-34799-2_17","volume-title":"Advances in Cryptology \u2014 Crypto\u201988","author":"K. Ohta","year":"1990","unstructured":"Ohta, K., and Okamoto, T., \u201cA Modification of the Fiat-Shamir Scheme,\u201d Advances in Cryptology \u2014 Crypto\u201988, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, pp.232\u2013243 (1990)."},{"key":"17_CR22","series-title":"Lect Notes Comput Sci","first-page":"134","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u201989","author":"T. Okamoto","year":"1989","unstructured":"Okamoto, T., and Ohta, K., \u201cDivertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducibility,\u201d Advances in Cryptology \u2014 Eurocrypt\u201989, Lecture Notes in Computer Science 434, Springer-Verlag, Berlin, pp.134\u2013149 (1989)."},{"key":"17_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1007\/3-540-38424-3_33","volume-title":"Advances in Cryptology \u2014 Crypto\u201990","author":"T. Okamoto","year":"1991","unstructured":"Okamoto, T., and Ohta, K., \u201cHow to utilize the randomness of Zero-Knowledge Proofs,\u201d Advances in Cryptology \u2014 Crypto\u201990, Lecture Notes in Computer Science 537, Springer-Verlag, Berlin, pp.456\u2013475 (1991)."},{"key":"17_CR24","unstructured":"Ohta, K., Okamoto, T., and Fujioka, A., \u201cSecure bit commitment function against divertibility,\u201d EUROCRYPTO\u201992 Extended Abstracts, (May 1992)."},{"key":"17_CR25","unstructured":"Sakurai, K. and Itoh, T \u201cTestifiable Identification and Its application to a Digital Credit Card,\u201d Proc. of the 1992 Symposium on Cryptography and Information Security, 1D, Japan (April 1992)."},{"key":"17_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 Crypto\u201989","author":"C. P. Schnorr","year":"1990","unstructured":"Schnorr, C. P., \u201cEfficient identification and signatures for smart cards,\u201d Advances in Cryptology \u2014 Crypto\u201989, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.239\u2013252 (1990)."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Tompa, M. and Woll, H., \u201cRandom Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information,\u201d IEEE Annual Symposium on Foundations of Computer Science, pp.472\u2013482 (October 1987).","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:12Z","timestamp":1605647712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_17","relation":{},"subject":[]}}