{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T09:23:38Z","timestamp":1773912218349,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1996,9,1]],"date-time":"1996-09-01T00:00:00Z","timestamp":841536000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1996,9]]},"DOI":"10.1007\/bf00189261","type":"journal-article","created":{"date-parts":[[2004,9,25]],"date-time":"2004-09-25T06:28:10Z","timestamp":1096093690000},"page":"217-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Joint encryption and message-efficient secure computation"],"prefix":"10.1007","volume":"9","author":[{"given":"Matthew","family":"Franklin","sequence":"first","affiliation":[]},{"given":"Stuart","family":"Haber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF00189261_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/3-540-48184-2_7","volume-title":"Advances in Cryptology\u2014CRYPTO '87 Proceedings","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, I. Damg\u00e5rd, and J. van de Graaf, Multiparty computations ensuring privacy of each party's input and correctness of the result, Advances in Cryptology\u2014CRYPTO '87 Proceedings (Lecture Notes in Computer Science, Vol. 293), ed. C. Pomerance, pp. 87\u2013119, Springer-Verlag, Berlin, 1988."},{"key":"BF00189261_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology\u2014CRYPTO '87 Proceedings","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, Society and group oriented cryptography: a new concept, Advances in Cryptology\u2014CRYPTO '87 Proceedings (Lecture Notes in Computer Science, Vol. 293), ed. C. Pomerance, pp. 120\u2013127, Springer-Verlag, Berlin, 1988."},{"key":"BF00189261_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology\u2014CRYPTO '89 Proceedings","author":"Y. Desmedt","year":"1990","unstructured":"Y. Desmedt and Y. Frankel, Threshold cryptosystems, Advances in Cryptology\u2014CRYPTO '89 Proceedings (Lecture Notes in Computer Science, Vol. 435), ed. G. Brassard, pp. 307\u2013315, Springer-Verlag, Berlin, 1990."},{"issue":"6","key":"BF00189261_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22(6):644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"BF00189261_CR5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31:469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"BF00189261_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/3-540-48184-2_10","volume-title":"Advances in Cryptography\u2014CRYPTO '87 Proceedings","author":"Z. Galil","year":"1988","unstructured":"Z. Galil, S. Haber, and M. Yung, Cryptographic computation: secure fault-tolerant protocols and the public-key model, Advances in Cryptography\u2014CRYPTO '87 Proceedings (Lecture Notes in Computer Science, Vol. 293), ed. C. Pomerance, pp. 135\u2013155, Springer-Verlag, Berlin, 1988."},{"key":"BF00189261_CR7","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, Proceedings of the 19th Annual Symposium on Theory of Computing, 1987, pp. 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"BF00189261_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/3-540-48184-2_6","volume-title":"Advances in Cryptology\u2014CRYPTO '87 Proceedings","author":"O. Goldreich","year":"1988","unstructured":"O. Goldreich and R. Vainish, How to solve any protocol problem\u2014an efficiency improvement, Advances in Cryptology\u2014CRYPTO '87 Proceedings (Lecture Notes in Computer Science, Vol. 293), ed. C. Pomerance, pp. 73\u201386, Springer-Verlag, Berlin, 1988."},{"key":"BF00189261_CR9","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF00189261_CR10","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K. McCurley","year":"1988","unstructured":"K. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology, 1:95\u2013105, 1988.","journal-title":"Journal of Cryptology"},{"key":"BF00189261_CR11","series-title":"Lecture Notes in Computer Science","first-page":"114","volume-title":"Advances in Cryptology\u2014CRYPTO '92 Proceedings","author":"S. Micali","year":"1993","unstructured":"S. Micali, Fair public-key cryptosystems, Advances in Cryptology\u2014CRYPTO '92 Proceedings (Lecture Notes in Computer Science, Vol. 740), ed. E. Brickell, pp. 114\u2013139, Springer-Verlag, Berlin, 1993."},{"key":"BF00189261_CR12","unstructured":"Z. Shmuely, Composite Diffie-Hellman public-key generating systems are hard to break, Technical Report #356, Technion\u2014Israel Institute of Technology, February 1985."},{"key":"BF00189261_CR13","doi-asserted-by":"crossref","unstructured":"A. Yao, Protocols for secure computations, Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982, pp. 160\u2013164.","DOI":"10.1109\/SFCS.1982.38"},{"key":"BF00189261_CR14","doi-asserted-by":"crossref","unstructured":"A. Yao, How to generate and exchange secrets, Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986, pp. 162\u2013167.","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00189261.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00189261\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00189261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00189261.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:32:29Z","timestamp":1586334749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00189261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,9]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1996,9]]}},"alternative-id":["BF00189261"],"URL":"https:\/\/doi.org\/10.1007\/bf00189261","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,9]]},"assertion":[{"value":"11 April 1994","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 1995","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}