{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:21:39Z","timestamp":1742980899718,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_149","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:07Z","timestamp":1319723407000},"page":"849-852","source":"Crossref","is-referenced-by-count":0,"title":["Non-Malleability"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Dwork","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"149_CR1_149","first-page":"345","volume-title":"Constant-round coin-tossing with a man in the middle or realizing the shared random string model","author":"B Barak","year":"2002","unstructured":"Barak B (2002) Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: Proceedings of FOCS 2002, Vancouver, pp\u00a0345\u2013355"},{"key":"149_CR2_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/3-540-48910-X_7","volume-title":"Advances in cryptology\u00a0\u2013 EUROCRYPT\u201999, Prague","author":"R Canetti","year":"1999","unstructured":"Canetti R, Goldwasser S (1999) An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In: Stren J (ed) Advances in cryptology\u00a0\u2013 EUROCRYPT\u201999, Prague. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, pp\u00a090\u2013106"},{"key":"149_CR3_149","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in cryptology\u00a0\u2013 CRYPTO\u201998, Santa Barbara","author":"R Cramer","year":"1998","unstructured":"Cramer R, Shoup V (1998) A practical public key cryptosystem secure against adaptive chosen ciphertext attacks. In: Krawczyk\u00a0H (ed) Advances in cryptology\u00a0\u2013 CRYPTO\u201998, Santa Barbara. Lecture Notes in Computer Science, vol 1462. Springer, Berlin"},{"key":"149_CR4_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in cryptology\u00a0\u2013 EUROCRYPT 2002, Amsterdam","author":"R Cramer","year":"2002","unstructured":"Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen L (ed) Advances in cryptology\u00a0\u2013 EUROCRYPT 2002, Amsterdam. Lecture Notes in Computer Science, vol 2332. Springer, Berlin, pp\u00a045\u201364"},{"key":"149_CR5_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/3-540-44647-8_33","volume-title":"Advances in cryptology\u00a0\u2013 CRYPTO 2001, Santa Barbara","author":"A De Santis","year":"2001","unstructured":"De Santis A, Di Crescenzo G, Ostrovsky R, Persiano G, Sahai\u00a0A (2001) Robust non-interactive zero-knowledge. In: Kilian J (ed) Advances in cryptology\u00a0\u2013 CRYPTO 2001, Santa Barbara. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, pp\u00a0566\u2013598"},{"key":"149_CR6_149","first-page":"141","volume-title":"Non-interactive and non-malleable commitment","author":"G Di Crescenzo","year":"1998","unstructured":"Di Crescenzo G, Ishai Y, Ostrovsky R (1998) Non-interactive and non-malleable commitment. In: Proceedings STOC 1998, Dallas, pp 141\u2013150"},{"key":"149_CR7_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-44987-6_4","volume-title":"Advances in cryptology\u00a0\u2013 EUROCRYPT 2001, Innsbruck","author":"G Di Crescenzo","year":"2001","unstructured":"Di Crescenzo G, Katz J, Ostrovsky R, Smith A (2001) Efficient and non-interactive non-malleable commitment. In: Pfitzmann\u00a0B (ed) Advances in cryptology\u00a0\u2013 EUROCRYPT 2001, Innsbruck. Lecture Notes in Computer Science, vol 2045. Springer, Berlin, pp\u00a040\u201359"},{"issue":"2","key":"149_CR8_149","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D Dolev","year":"2000","unstructured":"Dolev D, Dwork C, Naor M (2000) Non-malleable cryptography. SIAM J Comp 30(2):391\u2013437","journal-title":"SIAM J Comp"},{"key":"149_CR9_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-44598-6_26","volume-title":"Advances in cryptology\u00a0\u2013 CRYPTO 2000, Santa Barbara","author":"M Fischlin","year":"2000","unstructured":"Fischlin M, Fischlin R (2000) Efficient non-malleable commitment schemes. In: Bellare M (ed) Advances in cryptology\u00a0\u2013 CRYPTO 2000, Santa Barbara. Lecture Notes in Computer Science, vol 1880. Springer, Berlin, pp\u00a0413\u2013431"},{"key":"149_CR10_149","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28:270\u2013299","journal-title":"J Comput Syst Sci"},{"key":"149_CR11_149","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/3-540-39200-9_15","volume-title":"Advances in cryptology\u00a0\u2013 EUROCRYPT 2003, Warsaw","author":"Y Lindell","year":"2003","unstructured":"Lindell Y (2003) A simpler construction of CCA2-secure public-key encryption under general assumptions. In: Biham E (ed) Advances in cryptology\u00a0\u2013 EUROCRYPT 2003, Warsaw. Lecture Notes in Computer Science, vol 2656. Springer, Berlin,\u00a0pp\u00a0241\u2013254"},{"key":"149_CR12_149","first-page":"543","volume-title":"Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security","author":"A Sahai","year":"1999","unstructured":"Sahai A (1999) Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: Proceedings of FOCS 1999, New York, pp\u00a0543\u2013553"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:03:03Z","timestamp":1591056183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_149","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}