{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:55:55Z","timestamp":1772106955962,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540577669","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_35","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:25:55Z","timestamp":1186349155000},"page":"413-419","source":"Crossref","is-referenced-by-count":12,"title":["Remark on the Threshold RSA Signature Scheme"],"prefix":"10.1007","author":[{"given":"Chuan-Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Narn-Yih","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel: \u201cShared Generation of Authenticators and Signatures\u201d, Advances in Cryptology \u2014 Cryto\u2019 91, Proceedings, pp.457\u2013469, Springer Verlag, 1991.","DOI":"10.1007\/3-540-46766-1_37"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"B. Blakley and G. R. Blakley. \u201cSecurity of Number Theoretic Public Key Cryptosystems Against Random Attack\u201d, Cryptologia, 1978. In three parts: Part 1: 2(4), pp.305\u2013321, Oct 1978; Part 2: 3(1), pp.29\u201342, Jan 1979; Part 3: 3(2), pp.105\u2013118, Apr 1979","DOI":"10.1080\/0161-117891853162"},{"issue":"3","key":"35_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/0898-1221(79)90039-7","volume":"5","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley and I. Borosh: \u201cRSA Public Key Cryptosystems Do Not Always Conceal Messages\u201d, Computers & Mathematics with Applications, 5(3): 169\u2013178, 1979.","journal-title":"Computers & Mathematics with Applications"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: \u201cHow to share a secret\u201d, Commun. ACM, 22:612\u2013613, 1979.","journal-title":"Commun. ACM"},{"issue":"2","key":"35_CR5","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/319566.319580","volume":"6","author":"G. I. Davida","year":"1981","unstructured":"G. I. Davida, D. L. Wells, and J. B. Kam: \u201cA Database Encryption System with Subkeys\u201d, ACM Trans. Database System, 6,(2), pp.312\u2013328, 1981.","journal-title":"ACM Trans. Database System"},{"key":"35_CR6","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G. L. Miller","year":"1976","unstructured":"Gary L. Miller: \u201cRiemann\u2019s hypothesis and tests for primality\u201d, J. Computer Systems Sci., 13, pp.300\u2013317, 1976.","journal-title":"J. Computer Systems Sci."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:15:42Z","timestamp":1605629742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_35","relation":{},"subject":[]}}