{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:20:16Z","timestamp":1725488416627},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_21","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"237-244","source":"Crossref","is-referenced-by-count":10,"title":["On the Difficulty of Software Key Escrow"],"prefix":"10.1007","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"Torben P.","family":"Pedersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"21_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-49264-X_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201995","author":"Y. Desmedt","year":"1995","unstructured":"Y. Desmedt. Securing traceability of ciphertexts \u2014 towards a secure software key escrow system. In L.C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology \u2014 EUROCRYPT\u201995, LNCS 921, pages 147\u2013157. Springer Verlag, 1995."},{"issue":"6","key":"21_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. on Information Theory, IT-22(6):644\u2013654, 1976.","journal-title":"IEEE Trans. on Information Theory"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory, IT-31:469\u2013472, 1985.","journal-title":"IEEE Trans. on Information Theory"},{"key":"21_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-44750-4_18","volume-title":"Advances in Cryptology-proceedings of CRYPTO 95","author":"Y. Frankel","year":"1995","unstructured":"Y. Frankel and M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Design. In Advances in Cryptology-proceedings of CRYPTO 95, volume 963 of Lecture Notes in Computer Science, pages 222\u2013235. Springer-Verlag, 1995."},{"key":"21_CR5","unstructured":"A proposed federal information processing standard for an escrowed encryption standard (EES). Federal register, July 30, 1993."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T19:35:21Z","timestamp":1550691321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}