{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:56:43Z","timestamp":1778605003967,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_17","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"190-199","source":"Crossref","is-referenced-by-count":292,"title":["Publicly Verifiable Secret Sharing"],"prefix":"10.1007","author":[{"given":"Markus","family":"Stadler","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In 20th Annual Symposium on the Theory of Computing (STOC), pages 1\u201310, 1988.","DOI":"10.1145\/62212.62213"},{"key":"17_CR2","first-page":"313","volume":"48","author":"B. Blakley","year":"1979","unstructured":"B. Blakley. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference 1979, volume 48 of American Federation of Information Processing Societies Proceedings, pages 313\u2013317, 1979.","journal-title":"Proceedings of the National Computer Conference 1979"},{"key":"17_CR3","series-title":"Technical Report","volume-title":"An efficient off-line electronic cash system based on the representation problem","author":"S. Brands","year":"1993","unstructured":"S Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, Amsterdam, 1993."},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"G. Brassard, D. Chaum, and C. Cr\u00e9peau. Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences, 37(2):156\u2013189, Oct. 1988.","journal-title":"Journal of Computer and System Sciences"},{"key":"17_CR5","unstructured":"E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457\u2013466. ACM, 1995."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.-M. Piveteau, and M. Stadler. An Efficient Fair Payment System. To appear in Proc. 3rd ACM Conference on Computer and Communications Security, 1996.","DOI":"10.1145\/238168.238193"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS), pages 383\u2013395, 1985.","DOI":"10.1109\/SFCS.1985.64"},{"issue":"6","key":"17_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"17_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469\u2013472, July 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1:77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS), pages 427\u2013437, 1987.","DOI":"10.1109\/SFCS.1987.4"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. In Advances in Cryptology \u2014 CRYPTO\u2019 86, volume 263 of Lecture Notes in Computer Science, pages 186\u2013194. Springer-Verlag, 1987."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In Proc. 17th ACM Symposium on Theory of Computing (STOC), pages 291\u2013304, 1985.","DOI":"10.1145\/22145.22178"},{"key":"17_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 88","author":"L. Guillou","year":"1988","unstructured":"L. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Advances in Cryptology \u2014 EUROCRYPT\u2019 88, volume 330 of Lecture Notes in Computer Science, pages 123\u2013128. Springer-Verlag, 1988."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung. Revokable and Versatile Electronic Money. To appear in Proc. 3rd ACM Conference on Computer and Communications Security, 1996.","DOI":"10.1145\/238168.238191"},{"key":"17_CR16","unstructured":"S. Micali. Fair cryptosystems. Technical Report TR-579.b, MIT, November 1993."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"NIST. Clipper chip technology, 30 April 1993.","DOI":"10.1016\/0142-0496(93)90216-J"},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","first-page":"221","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"T. Pedersen","year":"1992","unstructured":"T. Pedersen. Distributed provers with applications to undeniable signatures. In Advances in Cryptology \u2014 EUROCRYPT\u2019 91, volume 547 of Lecture Notes in Computer Science, pages 221\u2013242. Springer-Verlag, 1992."},{"key":"17_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89","author":"C. Schnorr","year":"1990","unstructured":"C. Schnorr. Efficient identification and signature for smart cards. In Advances in Cryptology \u2014 CRYPTO\u2019 89, volume 435 of Lecture Notes in Computer Science, pages 239\u2013252. Springer-Verlag, 1990."},{"issue":"11","key":"17_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22(11):612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"17_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 95","author":"M. Stadler","year":"1995","unstructured":"M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. In Advances in Cryptology \u2014 EUROCRYPT\u2019 95, volume 921 of Lecture Notes in Computer Science, pages 209\u2013219. Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:53Z","timestamp":1556724773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}