{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:20:22Z","timestamp":1725488422018},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_12","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"131-142","source":"Crossref","is-referenced-by-count":6,"title":["Short Discreet Proofs"],"prefix":"10.1007","author":[{"given":"Joan","family":"Boyar","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Peralta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In Proceedings of the 20th ACM Symposium on Theory of Computing (1988) pp. 103\u2013112.","key":"12_CR1","DOI":"10.1145\/62212.62222"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"S. Blum De","year":"1991","unstructured":"Blum, De Santis, Micali, Persiano: Non-interactive zero-knowledge. SIAM Journal on Computing 20 (1991) 1084\u20131118.","journal-title":"SIAM Journal on Computing"},{"doi-asserted-by":"crossref","unstructured":"Boyar, J., Brassard, G., Peralta, R.: Subquadratic zero-knowledge. In Proceedings of the 32th IEEE Symposium on Foundations of Computer Science (1991) pp. 69\u201378 (to appear in JACM).","key":"12_CR3","DOI":"10.1109\/SFCS.1991.185350"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/BF00204448","volume":"2","author":"J. Boyar","year":"1990","unstructured":"Boyar, J., Krentel, M., Kurtz, S.: A discrete logarithm implementation of zero-knowledge blobs. Journal of Cryptology 2 (1990) 63\u201376.","journal-title":"Journal of Cryptology"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF02620135","volume":"6","author":"J. Boyar","year":"1993","unstructured":"Boyar, J., Lund, C., Peralta, R.: On the communication complexity of zero-knowledge proofs. Journal of Cryptology 6 (1993) 65\u201385.","journal-title":"Journal of Cryptology"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., Cr\u00e9peau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37 (1988) 156\u2013189.","journal-title":"Journal of Computer and System Sciences"},{"key":"12_CR7","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"Advances in Cryptology-Proceedings of CRYPTO","author":"G. Brassard","year":"1987","unstructured":"Brassard, G., Cr\u00e9peau, C.: Zero-knowledge simulation of boolean circuits. In Advances in Cryptology-Proceedings of CRYPTO 86 (1987) vol. 263 of Lecture Notes in Computer Science, Springer-Verlag pp. 223\u2013233."},{"key":"12_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-47555-9_28","volume-title":"Advances in Cryptology-Proceedings of EURO-CRYPT 92","author":"I. Damg\u00e5rd","year":"1993","unstructured":"Damg\u00e5rd, I.: Non-interactive circuit based proofs and non-interactive perfect zero-knowledge with preprocessing. In Advances in Cryptology-Proceedings of EURO-CRYPT 92 (1993) vol. 658 of Lecture Notes in Computer Science, Springer-Verlag pp. 341\u2013355."},{"doi-asserted-by":"crossref","unstructured":"Feige, U., Lapidot, D., Shamir, A.: Multiple non-interactive zero-knowledge proofs based on a single random string. In Proceedings of the 31th IEEE Symposium on Foundations of Computer Science (1990) pp. 308\u2013317.","key":"12_CR9","DOI":"10.1109\/FSCS.1990.89549"},{"key":"12_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology-Proceedings of CRYPTO 86","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology-Proceedings of CRYPTO 86 (1987) vol. 263 of Lecture Notes in Computer Science, Springer-Verlag pp. 186\u2013194."},{"unstructured":"Kilian, J., Petrank, E.: An efficient non-interactive zero-knowledge proof ystem for NP with general assumptions. Technical Report No. TR95-038, Electronic Colloquium in Computational Complexity (ECCC), July 1995.","key":"12_CR11"},{"unstructured":"Lenstra, A. K.: Factoring integers using the web and number field sieve. In Proceedings of JAIST International Forum on Multimedia and Information Security (1995) Japan Advanced Institute of Science and Technology pp. 93\u2013113.","key":"12_CR12"},{"key":"12_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-48329-2_7","volume-title":"Advances in Cryptology-Proceedings of CRYPTO 93","author":"A. Santis De","year":"1993","unstructured":"De Santis, A., Di Crescenzo, G., Persiano, G.: Secret sharing and perfect zero knowledge. In Advances in Cryptology-Proceedings of CRYPTO 93 (1993) vol. 773 of Lecture Notes in Computer Science, Springer-Verlag pp. 73\u201384."},{"unstructured":"Odlyzko, A.: The future of integer factorization. In Proceedings of JAIST International Forum on Multimedia and Information Security (1995) Japan Advanced Institute of Science and Technology pp. 139\u2013151.","key":"12_CR14"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. Schnorr","year":"1991","unstructured":"Schnorr, C.: Efficient signature generation for smart cards. Journal of Cryptology 4 (1991) 161\u2013174.","journal-title":"Journal of Cryptology"},{"key":"12_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/3-540-48184-2_9","volume-title":"Advances in Cryptology-Proceedings of CRYPTO 87","author":"J. Graaf van de","year":"1988","unstructured":"van de Graaf, J., Peralta, R.: A simple and secure way to show the validity of your public key. In Advances in Cryptology-Proceedings of CRYPTO 87 (1988) vol. 293 of Lecture Notes in Computer Science, Springer-Verlag pp. 128\u2013134."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T01:17:20Z","timestamp":1550711840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}