{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:34:37Z","timestamp":1778297677513,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_10","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"83-94","source":"Crossref","is-referenced-by-count":7,"title":["An Identity-Based Signature Scheme with Bounded Life-Span"],"prefix":"10.1007","author":[{"given":"Olivier","family":"Delos","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0167-6423(93)90002-7","volume":"21","author":"M. Abadi","year":"1993","unstructured":"M. Abadi, M. Burrows, C. Kaufman and B. Lampson. Authentication and delegation with smart cards. Science of Computer Programming, No 21, pp. 93\u2013113, Elsevier, 1993.","journal-title":"Science of Computer Programming"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and S. Micali. How to sign given any trapdoor function. Proceedings of the 20 th Symposium on Theory of Computing, STOC\u201990, pp. 427\u2013437.","DOI":"10.1145\/62212.62216"},{"key":"10_CR3","unstructured":"M. V. D. Burmester. Recent developments in efficient Zero-Knowledge proofs. Talk given at the Universit\u00e9 Catholique de Louvain, June 1993."},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-38424-3_14","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 90","author":"J. Boyar","year":"1991","unstructured":"J. Boyar, D. Chaum, I. Damgard and T. Pedersen. Convertible Undeniable Signatures. Advances in cryptology, Proceedings of CRYPTO\u2019 90, Lecture Notes in Computer Science, No 537, pp. 189\u2013205, Springer-Verlag, 1991."},{"issue":"22","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1049\/el:19891013","volume":"25","author":"M. V. D. Burmester","year":"1989","unstructured":"M. V. D. Burmester and Y. G. Desmedt. Remarks on Soundness of Proofs. Electronic letters, pp. 1509\u20131510, Vol. 25, No 22, 26th October 1989.","journal-title":"Electronic letters"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, J. Killian and A. Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC\u201988, pp. 113\u2013131, May 2\u20134, 1988.","DOI":"10.1145\/62212.62223"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0020-0190(94)90015-9","volume":"50","author":"G. Crescenzo do","year":"1994","unstructured":"G. do Crescenzo and G. Persiano. Round-optimal perfect zero-knowledge proofs. Information Processing Letters, pp. 93\u201399, Vol. 50, No 2, 22 April 1994.","journal-title":"Information Processing Letters"},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 89","author":"D. Chaum","year":"1990","unstructured":"D. Chaum and H. van Antwerpen. Undeniable Signatures. Advances in cryptology, Proceedings of CRYPTO\u2019 89, Lecture Notes in Computer Science, No 435, pp. 212\u2013216, Springer-Verlag, 1990."},{"key":"10_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/3-540-46766-1_37","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 91","author":"Y. Desmedt","year":"1992","unstructured":"Y. Desmedt and Y. Frankel. Shared Generation of Authenticators and Signatures. Advances in cryptology, Proceedings of CRYPTO\u2019 91, Lecture Notes in Computer Science, No 576, pp. 457\u2013469, Springer-Verlag, 1992."},{"issue":"6","key":"10_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, Vol. IT-22, No 6, pp. 644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-57843-9_9","volume":"781","author":"O. Delos","year":"1994","unstructured":"O. Delos and J.-J. Quisquater. Efficient multi-signature schemes for cooperating entities. Proceedings of French-Israeli Workshop on Algebraic Coding, Lecture Notes in Computer Science, No 781, pp. 63\u201374, Springer-Verlag, 1994.","journal-title":"Proceedings of French-Israeli Workshop on Algebraic Coding, Lecture Notes in Computer Science"},{"key":"10_CR12","unstructured":"O. Delos and J.-J. Quisquater. Biauthentication and secret message transmission. Manuscript UCL 1994."},{"key":"10_CR13","unstructured":"D. de Waleffe and J.-J. Quisquater. Better login protocols for computer networks. Proceedings of ESORICS\u2019 90, pp. 163\u2013172, October 1990."},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat and A. Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2), pp. 77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/0161-118991863880","volume":"13","author":"L. C. Guillou","year":"1989","unstructured":"L. C. Guillou, M. Davio and J.-J. Quisquater Public-key techniques: Randomness and Redundancy. Cryptologia, Vol. 13, No 2, pp. 167\u2013189, April 1989.","journal-title":"Cryptologia"},{"key":"10_CR16","unstructured":"O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. Technical Report No 570 of Technion, 1989."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptative chosen-message attacks. Siam J. Comput., 1988, Vol. 17, pp. 281\u2013308.","journal-title":"Siam J. Comput."},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. Siam J. Comput., 1989, Vol. 18, No 1, pp. 186\u2013208.","journal-title":"Siam J. Comput."},{"key":"10_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48184-2_19","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 87","author":"L. C. Guillou","year":"1988","unstructured":"L. C. Guillou and J.-J. Quisquater. Efficient digital public-key signatures with shadow. Advances in cryptology, Proceedings of CRYPTO\u2019 87, Lecture Notes in Computer Science, No 304, p. 223, Springer-Verlag, 1988."},{"key":"10_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 88","author":"L.C. Guillou","year":"1988","unstructured":"L.C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In C. G. G\u00fcnther, editor, Advances in Cryptology, Proceedings of EUROCRYPT\u2019 88, Lecture Notes in Computer Science, No 330, pp. 123\u2013128, Springer-Verlag, 1988."},{"key":"10_CR21","series-title":"Lect Notes Comput Sci","first-page":"216","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 88","author":"L.C. Guillou","year":"1989","unstructured":"L.C. Guillou and J.-J. Quisquater. A \u201cparadoxical\u201d identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology, Proceedings of CRYPTO\u2019 88, Lecture Notes in Computer Science, No 403, pp. 216\u2013231, Springer-Verlag, 1989."},{"key":"10_CR22","unstructured":"L. C. Guillou, M. Ugon and J.-J. Quisquater. The Smart Card: A Standardized Security Device Dedicated to Public Cryptology. Contemporary Cryptology: The Science Information Integrity, edited by G. J. Simmons, IEEE Press, 1991."},{"key":"10_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 90","author":"S. Haber","year":"1991","unstructured":"S. Haber and W.S. Stornetta. How to Time-Stamp a Digital Document. Advances in Cryptology, Proceedings of CRYPTO\u2019 90, Lecture Notes in Computer Science, No 537, pp. 437\u2013455, Springer-Verlag, 1991."},{"issue":"11","key":"10_CR24","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport. Password Authentication With Insecure Communication. Comm. of ACM, Vol. 24, No 11, pp. 770\u2013772, Nov. 1981.","journal-title":"Comm. of ACM"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"K. Mc Curley. Odd and ends from cryptology and computational number theory. Cryptology and computational number theory, edited by C. Pomerance, AMS short course, pp. 145\u2013166, 1990.","DOI":"10.1090\/psapm\/042\/1095555"},{"key":"10_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 89","author":"R. C. Merkle","year":"1989","unstructured":"R. C. Merkle. A Certified Digital Signature. Advances in Cryptology, Proceedings of CRYPTO\u2019 89, Lecture Notes in Computer Science, No 435, pp. 218\u2013238, Springer-Verlag, 1989."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal One-way Hash Functions and their Cryptographic Applications. Proceedings of the 21 st Symposium on Theory of Computing, STOC\u201989, pp. 33\u201343, 1989.","DOI":"10.1145\/73007.73011"},{"key":"10_CR28","series-title":"Lect Notes Comput Sci","first-page":"203","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 87","author":"J.-J. Quisquater","year":"1987","unstructured":"J.-J. Quisquater. Secret distribution of keys for public-key system. Advances in cryptology, Proceedings of CRYPTO\u2019 87, Lecture Notes in Computer Science, No 293, pp. 203\u2013208, Springer-Verlag, 1987."},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"M. O. Rabin","year":"1980","unstructured":"M. O. Rabin. Probabilistic algorithms for testing primality. Journal on Number Theory, Vol. 12, pp. 128\u2013138, 1980.","journal-title":"Journal on Number Theory"},{"key":"10_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in cryptology, Proceedings of CRYPTO\u2019 84","author":"A. Shamir","year":"1985","unstructured":"A. Shamir. Identity-based cryptosystems and signatures schemes. Advances in cryptology, Proceedings of CRYPTO\u2019 84, Lecture Notes in Computer Science, No 196, pp. 47\u201353, Springer-Verlag, 1985."},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"A. Shamir, R. Rivest and L. Adleman. Mental Poker. The Mathematical Gardner, edited by D. A. Klarner, Wadsworth International, 1981.","DOI":"10.1007\/978-1-4684-6686-7_5"},{"key":"10_CR32","volume-title":"M\u00e9moire de Magist\u00e8re de Math\u00e9matiques Fondamentales et Appliqu\u00e9es et d\u2019Informatique","author":"S. Vaudenay","year":"1993","unstructured":"S. Vaudenay. M\u00e9moire de Magist\u00e8re de Math\u00e9matiques Fondamentales et Appliqu\u00e9es et d\u2019Informatique. GRECC, Laboratoire d\u2019Informatique de l\u2019Ecole Normale Sup\u00e9rieure, Paris, 1993."},{"key":"10_CR33","volume-title":"Special Signature Schemes","author":"E. Heijst van","year":"1992","unstructured":"E. van Heijst. Special Signature Schemes. Thesis for the degree of Doctor at the Eindhoven University of Technology (The Netherlands), July 1992."},{"key":"10_CR34","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1007\/3-540-46885-4_69","volume-title":"Advances in cryptology, Proceedings of EUROCRYPT\u2019 89","author":"M. Waidner","year":"1990","unstructured":"M. Waidner and B. Pfitzmann. The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with computationally Secure Serviceability. Advances in cryptology, Proceedings of EUROCRYPT\u2019 89, Lecture Notes in Computer Science, No 434, p.690, Springer-Verlag, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:07Z","timestamp":1605647767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_10","relation":{},"subject":[]}}