{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T06:56:17Z","timestamp":1758264977148},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"},{"type":"electronic","value":"9783540480716"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-48071-4_2","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"15-30","source":"Crossref","is-referenced-by-count":18,"title":["New Constructions of Fail-Stop Signatures and Lower Bounds"],"prefix":"10.1007","author":[{"given":"Eug\u00e8ne","family":"van Heijst","sequence":"first","affiliation":[]},{"given":"Torben Pryds","family":"Pedersen","sequence":"additional","affiliation":[]},{"given":"Birgit","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/3-540-46877-3_39","volume-title":"Eurocrypt\u2019 90","author":"G. Bleumer","year":"1991","unstructured":"Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A remark on a signature scheme where forgery can be proved; Eurocrypt\u2019 90, LNCS 473, Springer-Verlag, Berlin 1991, 441\u2013445."},{"key":"2_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Crypto\u2019 89","author":"D. Chaum","year":"1990","unstructured":"David Chaum, Hans van Antwerpen: Undeniable signatures; Crypto\u2019 89, LNCS 435, Springer-Verlag, Heidelberg 1990, 212\u2013216."},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1007\/3-540-46766-1_38","volume-title":"Crypto\u2019 91","author":"D. Chaum","year":"1992","unstructured":"David Chaum, Eug\u00e8ne van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer; Crypto\u2019 91, LNCS 576, Springer-Verlag, Berlin 1992, 470\u2013484."},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/3-540-38424-3_15","volume-title":"Crypto\u2019 90","author":"D. Chaum","year":"1991","unstructured":"David Chaum, Sandra Roijkakkers: Unconditionally Secure Digital Signatures; Crypto\u2019 90, LNCS 537, Springer-Verlag, Berlin 1991, 206\u2013214."},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Eurocrypt\u2019 87","author":"I. B. Damg\u00e5rd","year":"1988","unstructured":"Ivan Bjerre Damg\u00e5rd: Collision free hash functions and public key signature schemes; Eurocrypt\u2019 87, LNCS 304, Springer-Verlag, Berlin 1988, 203\u2013216."},{"issue":"6","key":"2_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22\/","author":"W. Diffie","year":"1976","unstructured":"Whitfield Diffie, Martin E. Hellman: New Directions in Cryptography; IEEE Transactions on Information Theory 22\/6 (1976) 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR7","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1971","unstructured":"William Feller: An Introduction to Probability Theory and Its Applications, Vol. II (2nd. ed.); John Wiley & Sons, New York 1971.","edition":"2nd. ed."},{"key":"2_CR8","volume-title":"Information Theory and Reliable Communication","author":"R. G. Gallager","year":"1968","unstructured":"Robert G. Gallager: Information Theory and Reliable Communication; John Wiley & Sons, New York 1968."},{"key":"2_CR9","series-title":"Lect Notes Comput Sci","first-page":"104","volume-title":"Crypto\u2019 86","author":"O. Goldreich","year":"1987","unstructured":"Oded Goldreich: Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme; Crypto\u2019 86, LNCS 263, Springer-Verlag, Berlin 1987, 104\u2013110."},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17\/","author":"S. Goldwasser","year":"1988","unstructured":"Shafi Goldwasser, Silvio Micali, Ronald L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks; SIAM J. Comput. 17\/2 (1988) 281\u2013308.","journal-title":"SIAM J. Comput."},{"key":"2_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/3-540-48184-2_9","volume-title":"Crypto\u2019 87","author":"J. Graaf van de","year":"1988","unstructured":"Jeroen van de Graaf, Ren\u00e9 Peralta: A simple and secure way to show the validity of your public key; Crypto\u2019 87, LNCS 293, Springer-Verlag, Berlin 1988, 128\u2013134."},{"key":"2_CR12","first-page":"337","volume-title":"Eurocrypt\u2019 92","author":"E. Heijst van","year":"1992","unstructured":"Eug\u00e8ne van Heijst, Torben Pryds Pedersen: How to Make Efficient Fail-stop Signatures; Eurocrypt\u2019 92, Extended Abstracts, 24.\u201328. 5. 1992, Balatonf\u00fcred, Hungary, 337\u2013346."},{"unstructured":"Leslie Lamport: Constructing Digital Signatures from a One-Way Function; SRI Intl. CSL-98, Oct. 1979.","key":"2_CR13"},{"doi-asserted-by":"crossref","unstructured":"Ralph C. Merkle: Protocols for Public Key Cryptosystems; Proc. 1980 Symposium on Security and Privacy, Oakland 1980, 122\u2013134.","key":"2_CR14","DOI":"10.1109\/SP.1980.10006"},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Crypto\u2019 87","author":"R. C. Merkle","year":"1988","unstructured":"Ralph C. Merkle: A digital signature based on a conventional encryption function; Crypto\u2019 87, LNCS 293, Springer-Verlag, Berlin 1988, 369\u2013378."},{"key":"2_CR16","first-page":"125","volume-title":"Proc. Compsec\u2019 91, 8th world conference on computer security, audit and control","author":"B. Pfitzmann","year":"1991","unstructured":"Birgit Pfitzmann: Fail-stop Signatures; Principles and Applications; Proc. Compsec\u2019 91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125\u2013134."},{"unstructured":"Birgit Pfitzmann, Michael Waidner: Formal Aspects of Fail-stop Signatures; Fakult\u00e4t f\u00fcr Informatik, University Karlsruhe, Report 22\/90, Dec. 1990.","key":"2_CR17"},{"unstructured":"Birgit Pfitzmann, Michael Waidner: Fail-stop Signatures and their Application; Securicom 91, Paris, 19.\u201322. March 1991, 145\u2013160.","key":"2_CR18"},{"key":"2_CR19","series-title":"Lect Notes Comput Sci","first-page":"339","volume-title":"STACS 92","author":"B. Pfitzmann","year":"1992","unstructured":"Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors; STACS 92, LNCS 577, Springer-Verlag, Berlin 1992, 339\u2013350."},{"issue":"1","key":"2_CR20","first-page":"10","volume":"37\/","author":"C. E. Shannon","year":"1949","unstructured":"Claude E. Shannon: Communication in the Presence of Noise; Proceedings of the Institute of Radio Engineers 37\/1 (1949) 10\u201321.","journal-title":"Proceedings of the Institute of Radio Engineers"},{"key":"2_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1007\/3-540-46885-4_69","volume-title":"Eurocrypt\u2019 89","author":"M. Waidner","year":"1990","unstructured":"Michael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability; Eurocrypt\u2019 89, LNCS 434, Springer-Verlag, Berlin 1990, 690. (Full version: Unconditional Sender and Recipient Untraceability in spite of Active Attacks \u2014 Some Remarks; Fakult\u00e4t f\u00fcr Informatik, University Karlsruhe, Report 5\/89, March 1989.)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T22:17:02Z","timestamp":1550701022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573401","9783540480716"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1993]]}}}