{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:05Z","timestamp":1725572045848},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_20","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"244-251","source":"Crossref","is-referenced-by-count":1,"title":["Send Message into a Definite Future"],"prefix":"10.1007","author":[{"given":"Wenbo","family":"Mao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/3-540-49649-1_30","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"M. Burmester","year":"1998","unstructured":"Burmester, M., Desmedt, Y., Seberry, J.: Equitable key escrow with limited time span. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 380\u2013391. Springer, Heidelberg (1998)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","first-page":"201","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"I.B. Damg\u00e5rd","year":"1994","unstructured":"Damg\u00e5rd, I.B.: Practical and provably secure release of a secret and exchange of signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 201\u2013217. Springer, Heidelberg (1994)"},{"key":"20_CR3","volume-title":"Handbook of Applied Cryp-tography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryp-tography. CRC Press, Boca Raton (1997)"},{"issue":"143","key":"20_CR4","first-page":"918","volume":"32","author":"J.M. Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo method for index computation (mod p). Mth. Comp.\u00a032(143), 918\u2013924 (1978)","journal-title":"Mth. Comp."},{"key":"20_CR5","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puz- zles and timed-release crypto. Manuscript, Available at \n                    \n                      http:\/\/theory.lcs.mit.edu\/~rivest\/RivestShamirWagner-timelock.ps"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/3-540-48184-2_9","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"J. Graaf van de","year":"1988","unstructured":"van de Graaf, J., Peralta, R.: A simple and secure way to show the validity of your public key. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 128\u2013134. Springer, Heidelberg (1988)"},{"issue":"1","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P.C. Oorschot van","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. of Cryptology\u00a012(1), 1\u201328 (1999), \n                    \n                      http:\/\/theory.lcs.mit.edu\/rivest\/RivestShamirWagner-timelock.ps","journal-title":"J. of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T16:24:25Z","timestamp":1553271865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}