{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:08:36Z","timestamp":1753520916124},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_10","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"119-133","source":"Crossref","is-referenced-by-count":23,"title":["Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals"],"prefix":"10.1007","author":[{"given":"Eric R.","family":"Verheul","sequence":"first","affiliation":[]},{"given":"Henk C. A.","family":"van Tilborg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"10_CR1","unstructured":"R. Anderson, M. Roe, The GCHQ Protocol and its Problems, these proceedings."},{"key":"10_CR2","first-page":"180","volume-title":"Building in Big Brother","author":"D.M. Balenson","year":"1996","unstructured":"D.M. Balenson, C.M. Ellison, S.B. Lipner, S.T. Walker (TIS Inc.), A New Approach to Software Key Escrow Encryption, in: L.J. Hoffman (ed.), Building in Big Brother (Springer, New York, 1996), pp. 180\u2013207. See also http:\/\/www.tis.com ."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"D. Chaum, T.P. Pedersen, Wallet Databases with Observers Advances in Cryptology \u2014 CRYPTO\u2019 92 Proceedings, Springer-Verlag, 1993, pp. 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, Finding a Small Root of a Univariate Modular Equation, Advances in Cryptology \u2014 EUROCRYPT\u2019 96 Proceedings, Springer-Verlag, 1995, pp. 155\u2013165.","DOI":"10.1007\/3-540-68339-9_14"},{"key":"10_CR5","unstructured":"R. Cramer, R. Gennaro, B. Schoenmakers A Secure and Optimally Efficient Multi-Authority Election Scheme, these proceedings."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, Securing Traceability of Ciphertexts-Towards a Secure Key Escrow System, Advances in Cryptology \u2014 EUROCRYPT\u2019 95 Proceedings, Springer-Verlag, 1995, pp. 147\u2013157.","DOI":"10.1007\/3-540-49264-X_12"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A Public Key Cryptosystem and a Signature scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory 31(4), 1985, pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR8","unstructured":"Interagency Working Group on Cryptography Policy, Enabling Privacy, Commerce, Security and Public Safety in the Global Information Infrastructure, 17 May 1996, see http:\/\/www.cdt.org\/crypto\/clipper_III ."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"L.C. Guillou, J.-J. Quisquater A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory, Advances in Cryptology \u2014 EUROCRYPT\u2019 86 Proceedings, Springer-Verlag, 1986, pp. 123\u2013128.","DOI":"10.1007\/3-540-45961-8_11"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"J. Hastad, On Using RSA with Low Exponent in a Public Key Network, Advances in Cryptology \u2014 CRYPTO\u2019 85 Proceedings, Springer-Verlag, 1993, pp. 403\u2013405.","DOI":"10.1007\/3-540-39799-X_29"},{"key":"10_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/BFb0032349","volume-title":"Cryptography: Policy and Algorithms, Proceedings of the conference","author":"N. Jefferies","year":"1996","unstructured":"N. Jefferies, C. Mitchell, M. Walker, A Proposed Architecture for Trusted Third Party Services, Cryptography: Policy and Algorithms, Proceedings of the conference, Springer-Verlag (LNCS 1029), 1996, pp. 98\u2013104."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"A.K. Lenstra, P. Winkler, Y. Yacobi A Key-Escrow System with Warrants Bounds, Advances in Cryptology \u2014 CRYPTO\u2019 95 Proceedings, Springer-Verlag, 1995, pp. 197\u2013207.","DOI":"10.1007\/3-540-44750-4_16"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"S. Micali, Fair Public-key Cryptosystems, Advances in Cryptology \u2014 CRYPTO\u2019 92 Proceedings, Springer-Verlag, 1993, pp. 113\u2013138.","DOI":"10.1007\/3-540-48071-4_9"},{"key":"10_CR14","first-page":"720","volume-title":"Cryptography\u2019s Role in Securing the Information Society","author":"National Research Council","year":"1996","unstructured":"National Research Council, Cryptography\u2019s Role in Securing the Information Society, K.W. Dam, H.S. Lin (Editors), National Academy Press Washington, D.C. 1996, pp.720."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"T.P. Petersen, Distributed Provers with Applications to Undeniable Signatures, Advances in Cryptology \u2014 EUROCRYPT\u2019 91, Springer-Verlag, 1991, pp. 221\u2013242.","DOI":"10.1007\/3-540-46416-6_20"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"T.P. Petersen, A Threshold Cryptosystem Without a Trusted Party, Advances in Cryptology-EUROCRYPT\u2019 91, Springer-Verlag, 1991, pp. 522\u2013526.","DOI":"10.1007\/3-540-46416-6_47"},{"key":"10_CR17","unstructured":"C.P. Schnorr, Efficient Signature Generation for Smart Cards, Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings, Springer-Verlag, 1990, pp. 225\u2013232."},{"key":"10_CR18","unstructured":"D.R. Stinson Cryptography: theory and practice, CRC press, 1995, pp.434."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"E.R. Verheul, B.-J. Koops, H.C.A. van Tilborg, Binding Cryptography. A fraud-detectible alternative to key-escrow solutions, Computer Law and Security Report, January\u2013February 1997, pp. 3\u201314.","DOI":"10.1016\/S0267-3649(97)81186-7"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:31:48Z","timestamp":1556724708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}