{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T23:01:18Z","timestamp":1765062078432},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_30","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"344-353","source":"Crossref","is-referenced-by-count":16,"title":["On the Security of a Practical Identification Scheme"],"prefix":"10.1007","author":[{"given":"Victor","family":"Shoup","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Kilian, and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology \u2014 Crypto\u2019 93, pages 232\u2013233, 1993.","DOI":"10.1007\/3-540-48329-2_21"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. J. Cryptology, 1:77\u201394, 1988.","journal-title":"J. Cryptology"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology\u2014Crypto\u2019 86, pages 186\u2013194, 1986.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18:186\u2013208, 1989.","journal-title":"SIAM J. Comput."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17:281\u2013308, 1988.","journal-title":"SIAM J. Comput."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"L. Guillou and J. Quisquater. A \u201cparadoxical\u201d identity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology\u2014Crypto\u2019 88, pages 216\u2013231, 1988.","DOI":"10.1007\/0-387-34799-2_16"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"L. Guillou and J. Quisquater. A practical zero-knowledge protocol fitted to security microprocesors minimizing both transmission and memory. In Advances in Cryptology-Eurocrypt\u2019 88, pages 123\u2013128, 1988.","DOI":"10.1007\/3-540-45961-8_11"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"K. Ohta and T. Okamoto. A modification of the Fiat-Shamir Scheme. In Advances in Cryptology-Crypto\u2019 88, pages 232\u2013243, 1988.","DOI":"10.1007\/0-387-34799-2_17"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Advances in Cryptology-Crypto\u2019 92, pages 31\u201353, 1992.","DOI":"10.1007\/3-540-48071-4_3"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"H. Ong and C. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In Eurocrypt, pages 432\u2013440, 1990.","DOI":"10.1007\/3-540-46877-3_38"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. Schnorr","year":"1991","unstructured":"C. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4:161\u2013174, 1991.","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:54Z","timestamp":1556724774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}