{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:49:25Z","timestamp":1770900565177,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_20","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"280-305","source":"Crossref","is-referenced-by-count":38,"title":["Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Markus","family":"Jakobsson","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"20_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 92 Proceedings","author":"M. Bellare","year":"1992","unstructured":"M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. Advances in Cryptology \u2014 Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Micali and R. Ostrovsky. Perfect Zero-Knowledge in Constant Rounds. Proceedings of the 22nd Annual Symposium on the Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100283"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Micali and R. Ostrovsky. The true complexity of statistical zero-Knowledge. Proceedings of the 22nd Annual Symposium on the Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100285"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s001459900009","volume":"9","author":"M. Bellare","year":"1996","unstructured":"M. Bellare and M. Yung. Certifying permutations: Non-interactive zero-knowledge based on any trapdoor permutation. Journal of Cryptology, Vol. 9, No. 1, pp. 149\u2013166, Winter 1996.","journal-title":"Journal of Cryptology"},{"key":"20_CR5","unstructured":"M. Blum. Coin Flipping over the Telephone. IEEE COMPCON 1982, pp. 133\u2013137."},{"issue":"6","key":"20_CR6","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"M. Blum","year":"1991","unstructured":"M. Blum, A. De Santis, S. Micali, and G. Persiano. Non-Interactive Zero-Knowledge Proof Systems. SIAM Journal on Computing, Vol. 20, No. 6, December 1991, pp. 1084\u20131118.","journal-title":"SIAM Journal on Computing"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, Vol. 13, No. 4, pp. 850\u2013864, November 1984.","journal-title":"SIAM Journal on Computing"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"G. Brassard and C. Cr\u00e9peau. Non-transitive Transfer of Confidence: A perfect Zero-knowledge Interactive protocol for SAT and Beyond. Proceedings of the 27th Symposium on Foundations of Computer Science, IEEE, 1986.","DOI":"10.1109\/SFCS.1986.33"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"G. Brassard, D. Chaum and C. Cr\u00e9peau. Minimum Disclosure Proofs of Knowledge. J. Computer and System Sciences, Vol. 37, 1988, pp. 156\u2013189.","journal-title":"J. Computer and System Sciences"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau and M. Yung. Constant round perfect zero knowledge computationally convincing protocols. Theoretical Computer Science, Vol. 84, No. 1, 1991.","DOI":"10.1016\/0304-3975(91)90259-5"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero-Knowledge Proofs of Identity. Journal of Cryptology, Vol. 1, 1988, pp. 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"U. Feige, D. Lapidot, and A. Shamir. Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String. Proceedings of the 31st Symposium on Foundations of Computer Science, IEEE, 1990.","DOI":"10.1109\/FSCS.1990.89549"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"U. Feige and A. Shamir. Witness Indistinguishable and Witness Hiding Protocols. Proceedings of the 22nd Annual Symposium on the Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100272"},{"key":"20_CR14","unstructured":"L. Fortnow. The Complexity of Perfect Zero-Knowledge. In Advances in Computing Research, Ed. S. Micali, Vol. 18, 1989."},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s001459900010","volume":"9","author":"O. Goldreich","year":"1996","unstructured":"O. Goldreich and A. Kahan. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. Journal of Cryptology, Vol. 9, No. 3, 1996, pp. 167\u2013190.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1137\/S0097539791220688","volume":"25","author":"O. Goldreich","year":"1996","unstructured":"O. Goldreich and H. Krawczyk. On the Composition of Zero Knowledge Proof Systems. SIAM J. on Computing, Vol. 25, No. 1, pp. 169\u2013192, 1996.","journal-title":"SIAM J. on Computing"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero knowledge proof systems. Journal of the Association for Computing Machinery, Vol. 38, No. 1, July 1991.","DOI":"10.1145\/116825.116852"},{"issue":"1","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O. Goldreich","year":"1994","unstructured":"O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, Vol. 7, No. 1, 1994, pp. 1\u201332.","journal-title":"Journal of Cryptology"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic Encryption. J. Computer and System Sciences, Vol. 28, 1984, pp. 270\u2013299.","journal-title":"J. Computer and System Sciences"},{"issue":"1","key":"20_CR20","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. on Computing, Vol. 18, No. 1, pp. 186\u2013208, February 1989.","journal-title":"SIAM J. on Computing"},{"key":"20_CR21","unstructured":"J. H\u00e5stad, R. Impagliazzo, L. Levin and M. Luby. Construction of a pseudo-random generator from any one-way function. Mansucript. Earlier versions in STOC 89 and STOC 90."},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and M. Luby. One-way Functions are Essential for Complexity-Based Cryptography. Proceedings of the 30th Symposium on Foundations of Computer Science, IEEE, 1989.","DOI":"10.1109\/SFCS.1989.63483"},{"key":"20_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 87 Proceedings","author":"R. Impagliazzo","year":"1987","unstructured":"R. Impagliazzo and M. Yung. Direct Minimum-Knowledge Computations. Advances in Cryptology \u2014 Crypto 87 Proceedings, Lecture Notes in Computer Science Vol. 293, C. Pomerance ed., Springer-Verlag, 1987."},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"T. Itoh and K. Sakurai. On the complexity of constant round ZKIP of possession of knowledge. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E76-A, No. 1, January 1993.","DOI":"10.1007\/3-540-57332-1_28"},{"key":"20_CR25","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 89 Proceedings","author":"M. Naor","year":"1989","unstructured":"M. Naor. Bit Commitment using Pseudo-Randomness. Advances in Cryptology \u2014 Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989."},{"key":"20_CR26","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 92 Proceedings","author":"M. Naor","year":"1992","unstructured":"M. Naor, R. Ostrovsky, R. Venkatasan, M. Yung. Perfect zero knowledge arguments for NP can be based on general complexity assumptions. Advances in Cryptology \u2014 Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992."},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and A. Wigderson. One-way functions are essential for non-trivial zero-knowledge. Proceedings of the Second Israel Symposium on Theory and Computing Systems, IEEE, 1993.","DOI":"10.1109\/ISTCS.1993.253489"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll. Random Self-Reducibility and Zero-Knowledge Interactive-Proofs of Possession of Information. Proceedings of the 28th Symposium on Foundations of Computer Science, IEEE, 1987.","DOI":"10.1109\/SFCS.1987.49"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"A. C. Yao. Theory and Applications of Trapdoor functions. Proceedings of the 23rd Symposium on Foundations of Computer Science, IEEE, 1982.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:19:35Z","timestamp":1737346775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}