{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:08:10Z","timestamp":1772021290898,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540594093","type":"print"},{"value":"9783540492641","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-49264-x_5","type":"book-chapter","created":{"date-parts":[[2007,8,7]],"date-time":"2007-08-07T06:52:09Z","timestamp":1186469529000},"page":"50-63","source":"Crossref","is-referenced-by-count":24,"title":["Verifiable Signature Sharing"],"prefix":"10.1007","author":[{"given":"Matthew K.","family":"Franklin","sequence":"first","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"D. Beaver, S. Micali, and P. Rogaway, \u201cThe round complexity of secure protocols,\u201d ACM STOC 1990, 503\u2013513.","DOI":"10.1145\/100216.100287"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson, \u201cCompleteness theorems for non-cryptographic fault-tolerant distributed computation,\u201d ACM STOC 1988, 1\u20139.","DOI":"10.1145\/62212.62213"},{"key":"5_CR3","unstructured":"E. Berlekamp and L. Welch, \u201cError correction of algebraic block codes,\u201d U.S. Patent Number 4,633,470."},{"key":"5_CR4","first-page":"313","volume":"48","author":"G. Blakely","year":"1979","unstructured":"G. Blakely \u201cSafeguarding cryptographic keys,\u201d AFIPS National Computer Conference 48 (1979), 313\u2013317.","journal-title":"AFIPS National Computer Conference"},{"key":"5_CR5","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum, \u201cSecurity without identification: transaction systems to make big brother obsolete,\u201d CACM 28 (1985), 1030\u20131044.","journal-title":"CACM"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Cr\u00e9peau, and I. Damg\u00e5rd, \u201cMultiparty unconditionally secure protocols,\u201d ACM STOC 1988, 11\u201319.","DOI":"10.1145\/62212.62214"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor, \u201cUntraceable electronic cash,\u201d Crypto 1988, 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, \u201cVerifiable secret sharing and achieving simultaneity in the presence of faults,\u201d IEEE FOCS 1985, 383\u2013395.","DOI":"10.1109\/SFCS.1985.64"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"A. DeSantis, Y. Desmedt, Y. Frankel, and M. Yung, \u201cHow to share a function securely,\u201d ACM STOC 1994, 522\u2013533.","DOI":"10.1145\/195058.195405"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. Desmedt","year":"1994","unstructured":"Y. Desmedt, \u201cThreshold cryptography,\u201d European Transactions on Telecommunications and Related Technologies 5 (1994), 449\u2013457.","journal-title":"European Transactions on Telecommunications and Related Technologies"},{"key":"5_CR11","unstructured":"NIST FIPS PUB 181, \u201cDigital signature standard,\u201d U.S. Department of Commerce\/National Institute of Standards and Technology."},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. Information Theory IT-31 (1985), 469\u2013472.","journal-title":"IEEE Trans. Information Theory"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"P. Feldman, \u201cA practical scheme for non-interactive verifiable secret sharing,\u201d IEEE FOCS 1987, 4427\u20134437.","DOI":"10.1109\/SFCS.1987.4"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"M. K. Franklin and M. K. Reiter, \u201cThe design and implementation of a secure auction service,\u201d IEEE Symposium on Security and Privacy, Oakland, CA, 1995 (to appear).","DOI":"10.1109\/SECPRI.1995.398918"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, \u201cHow to play any mental game,\u201d ACM STOC 1987, 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"5_CR16","unstructured":"V. Hadzilacos and S. Toueg, \u201cFault-tolerant broadcasts and related problems,\u201d In Distributed Systems (2nd edition), Chapter 5, Addison-Wesley, 1993."},{"key":"5_CR17","unstructured":"J. Hoffman, \u201cNew power-of-attorney form is introduced,\u201d The New York Times, October 1, 1994."},{"key":"5_CR18","unstructured":"J. Lacy, D. Mitchell, and W. Schell, \u201cCryptoLib: cryptography in software,\u201d 4th USENIX Security Workshop, pp. 1\u201317, 1993."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"L. Lamport, R. Shostak, and M. Pease, \u201cThe Byzantine generals problem,\u201d ACM TOPLAS 4 (1982), 382\u2013401.","journal-title":"ACM TOPLAS"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"S. Micali, \u201cFair public-key cryptosystems,\u201d Crypto 1992, 113\u2013138.","DOI":"10.1007\/3-540-48071-4_9"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"T. Pedersen, \u201cDistributed provers with applications to undeniable signatures,\u201d Eurocrypt 1991, 221\u2013242.","DOI":"10.1007\/3-540-46416-6_20"},{"key":"5_CR22","unstructured":"M. Rabin, \u201cDigitalized signatures and public key functions as intractable as factorization,\u201d Technical Report MIT\/LCS\/TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, 1979."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"M. K. Reiter, \u201cSecure agreement protocols: Reliable and atomic group multicast in Rampart,\u201d 2nd ACM Conf. Computer and Comm. Security, 68\u201380, 1994.","DOI":"10.1145\/191177.191194"},{"key":"5_CR24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems,\u201d CACM 21 (1978), 120\u2013126.","journal-title":"CACM"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. Schnorr","year":"1991","unstructured":"C. Schnorr, \u201cEfficient signature generation by smart cards,\u201d J. Cryptology 4 (1991), 161\u2013174.","journal-title":"J. Cryptology"},{"key":"5_CR26","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to share a secret,\u201d CACM 22 (1979), 612\u2013613.","journal-title":"CACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201995"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49264-X_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T20:09:43Z","timestamp":1556741383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49264-X_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540594093","9783540492641"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-49264-x_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}