{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:24:12Z","timestamp":1778153052828,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_32","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"372-386","source":"Crossref","is-referenced-by-count":54,"title":["New Convertible Undeniable Signature Schemes"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Damg\u00e5rd","sequence":"first","affiliation":[]},{"given":"Torben","family":"Pedersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"32_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/3-540-38424-3_14","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 90","author":"J. Boyar","year":"1991","unstructured":"J. Boyar, D. Chaum, I. Damg\u00e5rd, and T. Pedersen. Convertible Undeniable Signatures. In Advances in Cryptology \u2014 proceedings of CRYPTO 90, Lecture Notes in Computer Science, pages 189\u2013205. Springer-Verlag, 1991."},{"key":"32_CR2","series-title":"Lect Notes Comput Sci","first-page":"127","volume-title":"Advances in Cryptology \u2014 proceedings of EUROCRYPT 87","author":"D. Chaum","year":"1987","unstructured":"D. Chaum, J.-H. Evertse, and J. van de Graaf. An Improved Protocol for Demonstrating Possession of a Discrete Logarithm and some Generalizations. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 87, Lecture Notes in Computer Science, pages 127\u2013141, 1987."},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology \u2014 proceedings of EUROCRYPT 90","author":"D. Chaum","year":"1991","unstructured":"D. Chaum. Zero-Knowledge Undeniable Signatures. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 90, Lecture Notes in Computer Science, pages 458\u2013464. Springer Verlag, 1991."},{"key":"32_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 92","author":"D. Chaum","year":"1993","unstructured":"D. Chaum and T.P. Pedersen. Wallet Databases with Observers. In Advances in Cryptology \u2014 proceedings of CRYPTO 92, Lecture Notes in Computer Science, pages 89\u2013105. Springer-Verlag, 1993."},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 89","author":"D. Chaum","year":"1990","unstructured":"D. Chaum and H. van Antwerpen. Undeniable Signatures. In Advances in Cryptology \u2014 proceedings of CRYPTO 89, Lecture Notes in Computer Science, pages 212\u2013216. Springer Verlag, 1990."},{"issue":"6","key":"32_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"32_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-46416-6_19","volume-title":"Advances in Cryptology \u2014 proceedings of EUROCRYPT 91","author":"Y. Desmedt","year":"1991","unstructured":"Y. Desmedt and M. Yung. Weaknesses of Undeniable Signature Schemes. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 91, volume 547 of Lecture Notes in Computer Science, pages 205\u2013220. Springer-Verlag, 1991."},{"key":"32_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 84","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Advances in Cryptology \u2014 proceedings of CRYPTO 84, Lecture Notes in Computer Science, pages 10\u201318. Springer-Verlag, 1985."},{"key":"32_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/3-540-46416-6_21","volume-title":"Advances in Cryptology \u2014 proceedings of EUROCRYPT 91","author":"A. Fujioka","year":"1991","unstructured":"A. Fujioka, T. Okamoto and K. Ohta. Interactive Bi-Proof Systems and Undeniable Signature Schemes. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 91, volume 547 of Lecture Notes in Computer Science, pages 243\u2013256. Springer-Verlag, 1991."},{"key":"32_CR10","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. In Proceedings of the 25th IEEE Symposium on the Foundations of Computer Science, 1984."},{"issue":"2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen Message Attack. SIAM Journal on Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"32_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal of Computation, 18(1):186\u2013208, 1989.","journal-title":"SIAM Journal of Computation"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, K. Sako and R. Impagliazzo: Designated Verifier Proofs and Their Applications, 1996. These proceedings.","DOI":"10.1007\/3-540-68339-9_13"},{"key":"32_CR14","unstructured":"S. Micali, August 1990. Personal communication."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"M. Michels. Breaking and Repairing a Convertible Undeniable Signature Scheme. Technical Report TR-95-10-D, University of Technology, Chemnitz-Zwickau, June 1995. To appear at ACM Security, March 1996.","DOI":"10.1145\/238168.238207"},{"key":"32_CR16","unstructured":"M. O. Rabin. Digitalized Signatures and Public-Key Functions as Intractable as factorization. Technical Report MIT\/LCS\/TR-212, Laboratory for Computer Science, MIT, January 1979."},{"issue":"3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"issue":"147","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.2307\/2006082","volume":"33","author":"S. S. Wagstaff Jr.","year":"1979","unstructured":"S. S. Wagstaff Jr. Greatest of the Least Primes in Arithmetic Progression Having a Given Modulus. Mathematics of Computation, 33(147):1073\u20131080, July 1979.","journal-title":"Mathematics of Computation"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:33:03Z","timestamp":1556724783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}