{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T15:51:16Z","timestamp":1778860276672,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_13","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"143-154","source":"Crossref","is-referenced-by-count":410,"title":["Designated Verifier Proofs and Their Applications"],"prefix":"10.1007","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[]},{"given":"Kazue","family":"Sako","sequence":"additional","affiliation":[]},{"given":"Russell","family":"Impagliazzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Goldwasser, \u201cNew Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs,\u201d Crypto\u2019 89, pp. 194\u2013211.","DOI":"10.1007\/0-387-34805-0_19"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Micali, \u201cHow to Sign Given Any Trapdoor Function,\u201d 20th Annual STOC, 1988, pp. 32\u201342.","DOI":"10.1145\/62212.62216"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"J.C. Benaloh, D. Tuinstra, \u201cReceipt-Free Secret-Ballot Elections,\u201d 26th Annual STOC, 1994, pp. 544\u2013553.","DOI":"10.1145\/195058.195407"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"G. Brassard, D. Chaum, C. Cr\u00e9peau, \u201cMinimum Disclosure Proofs of Knowledge,\u201d Journal of Computer and System Sciences, Vol. 37, No. 2, Oct. 1988, pp. 156\u2013189","journal-title":"Journal of Computer and System Sciences"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"D. Chaum, H. van Antwerpen, \u201cUndeniable Signatures,\u201d Crypto\u2019 89, pp. 212\u2013216","DOI":"10.1007\/0-387-34805-0_20"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cZero-Knowledge Undeniable Signatures,\u201d Eurocrypt\u2019 90, pp. 458\u2013464","DOI":"10.1007\/3-540-46877-3_41"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, E. van Heijst, B. Pfitzmann, \u201cCryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer,\u201d Crypto\u2019 91, pp. 470\u2013484","DOI":"10.1007\/3-540-46766-1_38"},{"key":"13_CR8","unstructured":"D. Chaum, personal communication"},{"key":"13_CR9","unstructured":"I. Damg\u00e5rd, personal communication"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, C. Goutier, S. Bengio, \u201cSpecial Uses and Abuses of the Fiat-Shamir Passport Protocol,\u201d Crypto\u2019 87, pp. 21\u201339","DOI":"10.1007\/3-540-48184-2_3"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, M. Yung, \u201cWeaknesses with Undeniable Signature Schemes,\u201d Eurocrypt\u2019 91, pp. 205\u2013220","DOI":"10.1007\/3-540-46416-6_19"},{"issue":"6","key":"13_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Transactions on Information Theory, v. IT-22, n. 6, Nov 1976, pp. 644\u2013654","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork, M. Naor, \u201cNon-Malleable Cryptography,\u201d 23rd Annual STOC, 1991, pp. 542\u2013552","DOI":"10.1145\/103418.103474"},{"key":"13_CR14","first-page":"469","volume":"IT 31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithm,\u201d IEEE IT 31 (1985), pp. 469\u2013472","journal-title":"A public key cryptosystem and a signature scheme based on discrete logarithm"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, S. Micali, \u201cOn-Line\/Off-Line Digital Signatures,\u201d Crypto\u2019 89, pp. 263\u2013275","DOI":"10.1007\/0-387-34805-0_24"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Fiat, A. Shamir, \u201cZero Knowledge Proofs of Identity,\u201d Proceedings of the 19th annual ACM Symposium on Theory of Computing, pp. 210\u2013217","DOI":"10.1007\/BF02351717"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Shamir, \u201cWitness Indistinguishable and Witness Hiding Protocols,\u201d 22nd Annual STOC, 1990, p. 416\u2013426.","DOI":"10.1145\/100216.100272"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"A. Fiat, A. Shamir, \u201cHow to prove yourself; practical solution to identification and signature problems,\u201d Crypto\u2019 86, pp. 186\u2013194","DOI":"10.1007\/3-540-47721-7_12"},{"key":"13_CR19","unstructured":"Z. Galil, S. Haber, M. Yung, \u201cSymmetric Public-Key Cryptosystems\u201d, submitted to J. of Cryptology"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, \u201cProbabilistic Encryption & How To Play Mental Poker Keeping Secret All Partial Information,\u201d Proceedings of the 18th ACM Symposium on the Theory of Computing, 1982, pp. 270\u2013299","DOI":"10.1145\/800070.802212"},{"issue":"1","key":"13_CR21","first-page":"691","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"O. Goldreich, S. Micali, A. Widgerson, \u201cProofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems,\u201d Journal of the ACM, vol. 38, n. 1, 1991, pp. 691\u2013729","journal-title":"Journal of the ACM"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, \u201cBlackmailing using Undeniable Signatures\u201d, Eurocrypt\u2019 94, pp. 425\u2013427","DOI":"10.1007\/BFb0053457"},{"issue":"4","key":"13_CR23","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R.C. Merkle","year":"1978","unstructured":"R.C. Merkle, \u201cSecure Communication over Insecure Channels,\u201d Communications of the ACM, v. 21, n. 4, 1978, pp. 294\u2013299","journal-title":"Communications of the ACM"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"R. Merkle, \u201cA Certified Digital Signature,\u201d Crypto\u2019 89, pp. 218\u2013238","DOI":"10.1007\/0-387-34805-0_21"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"S. Micali, A. Shamir, \u201cAn Improvement of the Fiat-Shamir Identification and Signature Scheme,\u201d Crypto\u2019 88, pp. 244\u2013247","DOI":"10.1007\/0-387-34799-2_18"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"M. Naor, M. Yung, \u201cUniversal One-Way Hash Functions and their Cryptographic Application,\u201d 21st Annual STOC, 1989, pp. 33\u201343","DOI":"10.1145\/73007.73011"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Ohta, \u201cDivertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducibility,\u201d Eurocrypt\u2019 89, pp. 134\u2013149","DOI":"10.1007\/3-540-46885-4_16"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Ohta, \u201cHow to Utilize Randomness of Zero-Knowledge Proofs,\u201d Crypto\u2019 90, pp 456\u2013475.","DOI":"10.1007\/3-540-38424-3_33"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"H. Ong, C. P. Schnorr, \u201cFast signature generation with a Fiat-Shamir like scheme,\u201d Eurocrypt 90, pp. 432\u2013440","DOI":"10.1007\/3-540-46877-3_38"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"T. Pedersen, \u201cDistributed Provers with Applications to Undeniable Signatures,\u201d Eurocrypt\u2019 91, pp. 221\u2013238","DOI":"10.1007\/3-540-46416-6_20"},{"key":"13_CR31","unstructured":"J.-J. Quisquater, L.S. Guillou, \u201cA practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory,\u201d Eurocrypt\u2019 88, pp. 123\u2013128"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"C. Rackoff, D. Simon, \u201cNon-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack\u201d, Crypto\u2019 91, pp. 433\u2013444","DOI":"10.1007\/3-540-46766-1_35"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Communications of the ACM, v. 21, n. 2, Feb 1978, pp. 120\u2013126","journal-title":"Communications of the ACM"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"K. Sako, J. Kilian, \u201cReceipt-Free Mix-Type Voting Scheme,\u201d Eurocrypt\u2019 95, pp 393\u2013403.","DOI":"10.1007\/3-540-49264-X_32"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"A. Yao, \u201cProtocols for Secure Computations,\u201d Proceedings of the 23rd FOCS, 1982, pp. 160\u2013164","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:33:05Z","timestamp":1556739185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}