{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:28:40Z","timestamp":1758709720138},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666660"},{"type":"electronic","value":"9783540480006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-48000-6_30","type":"book-chapter","created":{"date-parts":[[2010,10,14]],"date-time":"2010-10-14T02:51:39Z","timestamp":1287024699000},"page":"378-389","source":"Crossref","is-referenced-by-count":19,"title":["A Signature Scheme with Message Recovery as Secure as Discrete Logarithm"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. of the First ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"30_CR2","series-title":"LNCS","first-page":"399","volume-title":"Proc. of Eurocrypt 1996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures \u2013How to Sign with RSA and Rabin. In: Proc. of Eurocrypt 1996. LNCS, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 1\u201312. Springer, Heidelberg (1998)"},{"key":"30_CR4","first-page":"209","volume-title":"Proc. of STOC","author":"R. Canetti","year":"1998","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The RandomO racle Methodology, Revisited. In: Proc. of STOC, pp. 209\u2013218. ACM Press, New York (1998)"},{"key":"30_CR5","series-title":"LNCS","volume-title":"Proc. of Crypto 1999","author":"J.S.D. Naccache","year":"1999","unstructured":"Naccache, J.S.D., Stern, J.P.: On the Security of RSA Padding. In: Proc. of Crypto 1999. LNCS, Springer, Heidelberg (1999)"},{"issue":"4","key":"30_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR7","series-title":"LNCS","first-page":"186","volume-title":"Proc. of Crypto 1986","author":"A. Fiat","year":"1986","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself. In: Proc. of Crypto 1986. LNCS, pp. 186\u2013194. Springer, Heidelberg (1986)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. J. of Cryptology\u00a01, 77\u201394 (1988)","journal-title":"J. of Cryptology"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. on Computing\u00a017, 281\u2013308 (1988)","journal-title":"SIAM J. on Computing"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"30_CR11","series-title":"LNCS","first-page":"1","volume-title":"Proc. of Asiacrypt 1996","author":"A. Miyaji","year":"1996","unstructured":"Miyaji, A.: A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. In: Proc. of Asiacrypt 1996. LNCS, pp. 1\u201314. Springer, Heidelberg (1996)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Universal One-Way Hash Functions and Their Cryptographic Applications. In: Proc. of STOC, pp. 33\u201343 (1989)","DOI":"10.1145\/73007.73011"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Nyberg, K., Rueppel, R.A.: A New Signature Scheme Based on the DSA Giving Message Recovery. In: Proc. of the First ACM Conference on Computer and Communications Security (1993)","DOI":"10.1145\/168588.168595"},{"key":"30_CR14","series-title":"LNCS","first-page":"182","volume-title":"Proc. of Eurocrypt 1994","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K., Rueppel, R.A.: Message Recovery for Signature Schemes Based on the Discrete LogarithmProb lem. In: Proc. of Eurocrypt 1994. LNCS, pp. 182\u2013193. Springer, Heidelberg (1995)"},{"key":"30_CR15","first-page":"61","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K., Rueppel, R.A.: Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. Designs, Codes and Cryptography\u00a07, 61\u201381 (1996)","journal-title":"Designs, Codes and Cryptography"},{"key":"30_CR16","series-title":"LNCS","volume-title":"Proc. of Crypto 1998","author":"K. Ohta","year":"1998","unstructured":"Ohta, K., Okamoto, T.: On the Concrete Security Treatment of Signatures Derived fromI dentification. In: Proc. of Crypto 1998. LNCS. Springer, Heidelberg (1998)"},{"key":"30_CR17","series-title":"LNCS","first-page":"387","volume-title":"Proc. of Eurocrypt 1996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security Proofs for Signature Schemes. In: Proc. of Eurocrypt 1996. LNCS, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Rompel, J.: One-Way Functions are Necessary and Sufficient for Secure Signature. In: Proc. of STOC, pp. 387\u2013394 (1990)","DOI":"10.1145\/100216.100269"},{"issue":"2","key":"30_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of ACM"},{"key":"30_CR20","series-title":"LNCS","first-page":"235","volume-title":"Proc. of Eurocrypt 1989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient Identification and Signatures for Smart Card. In: Proc. of Eurocrypt 1989. LNCS, pp. 235\u2013251. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-48000-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:27:21Z","timestamp":1553171241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-48000-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666660","9783540480006"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-48000-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}