{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:52:58Z","timestamp":1718499178791},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/bf03253323","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"1353-1364","source":"Crossref","is-referenced-by-count":3,"title":["Threshold signature for distributed time stamping scheme"],"prefix":"10.1007","volume":"62","author":[{"given":"Alexis","family":"Bonnecaze","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Trebuchet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03253323_CR1","series-title":"Report","volume-title":"Cryptology ePrint Archive","author":"P. Barreto","year":"2001","unstructured":"Barreto P., Kim H., Fast hashing onto elliptic curves over fields of characteristic 3, Cryptology ePrint Archive, Report 2001\/098"},{"key":"BF03253323_CR2","series-title":"Technical Report","volume-title":"Efficient Broadcast time-stamping","author":"J. Benaloh","year":"1991","unstructured":"Benaloh J., de Mare M., Efficient Broadcast time-stamping Technical Report 1, Clarkson University Department of Mathematics and Computer Science, August 1991."},{"key":"BF03253323_CR3","first-page":"274","volume":"765","author":"J. Benaloh","year":"1994","unstructured":"Benaloh J., de Mare M.)\n                  One-Way Accumulators: A Decentralized Alternative to Digital Signatures Advances in Cryptology-EUROCRYPT\u201993. lncs, vol. 765, pp. 274\u2013285, Springer-Verlag, 1994.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253323_CR4","volume-title":"CHRONOS: An Authenticated Dictionary Based on Skip Lists for Timestamping Systems","author":"K. Blibech","year":"2005","unstructured":"Blibech K., Gabillon A., CHRONOS: An Authenticated Dictionary Based on Skip Lists for Timestamping Systems, 2005 acm Workshop on Secure Web Services (sws) November 11, 2005 Fairfax, VA, USA."},{"key":"BF03253323_CR5","series-title":"Lecture Notes on Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman -group signature scheme, Practice and Theory in Public Key Cryptography \u2014 PKC\u20192003","author":"A. Boldyreva","year":"2003","unstructured":"Boldyreva A., Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman -group signature scheme, Practice and Theory in Public Key Cryptography \u2014 PKC\u20192003, Lecture Notes on Computer Science 2567, Springer-Verlag (2003), pp. 31\u201346. See also Cryptology ePrint Archive, Report 2002\/118."},{"key":"BF03253323_CR6","volume-title":"A Distributed time stamping scheme, sar","author":"A. Bonnecaze","year":"2005","unstructured":"Bonnecaze A., Liardet P., Gabillon A., Blibech K., A Distributed time stamping scheme, sar 2005."},{"key":"BF03253323_CR7","series-title":"Annals of telecommunications","volume-title":"Secure time-stamping schemes: a distributed point of view","author":"A. Bonnecaze","year":"2006","unstructured":"Bonnecaze A., Liardet P., Gabillon A., Blibech K., Secure time-stamping schemes: a distributed point of view, Annals of telecommunications, vol. 61, n\u00b05-6, may-june 2006."},{"key":"BF03253323_CR8","series-title":"Advances in Cryptology, Asiacrypt\u20192001, Lecture Notes on Computer Science","first-page":"514","volume-title":"Short signatures from the Weil pairing","author":"D. Boneh","year":"2002","unstructured":"Boneh D., Lynn B., Shacham H., Short signatures from the Weil pairing, Advances in Cryptology, Asiacrypt\u20192001, Lecture Notes on Computer Science 2248, Springer-Verlag (2002), pp. 514\u2013532."},{"key":"BF03253323_CR9","series-title":"lncs","first-page":"465","volume-title":"crypto","author":"E. Bresson","year":"2002","unstructured":"Bresson E., Stern J., Szydlo M., Threshold ring signatures and applications to ad-hoc groups, In: crypto 2002, lncs 2442, pp. 465\u2013480. Springer-Verlag, 2002."},{"key":"BF03253323_CR10","first-page":"486","volume-title":"Time-stamping with Binary Linking Schemes, Advances on Cryptology \u2014 crypto\u201998, Lecture Notes in Computer Science","author":"A. Buldas","year":"1998","unstructured":"Buldas A., Laud P., Lipmaa H., Villemson J., Time-stamping with Binary Linking Schemes, Advances on Cryptology \u2014 crypto\u201998, Lecture Notes in Computer Science, Springer-Verlag, (1998), pp. 486\u2013501."},{"key":"BF03253323_CR11","unstructured":"Buldas (A., Lipmaa (H.), Digital Signatures, Timestamping and the Corresponding Infrastructure K\u00fcberneetika AS, Technical Report, 21 Jan. 98."},{"key":"BF03253323_CR12","doi-asserted-by":"crossref","unstructured":"Courtois N., Finiasz (M., Sendrier (N., How to achieve a McEliece-based digital signature scheme, Proceedings of Asiacrypt\u20192001. Available online at http:\/\/eprint.iacr.org\/2001\/010\/.","DOI":"10.1007\/3-540-45682-1_10"},{"key":"BF03253323_CR13","first-page":"307","volume-title":"Proc. crypto\u201989 (lncs 435)","author":"Y. Desmedt","year":"1989","unstructured":"Desmedt Y., Frankel Y., Threshold cryptosystems, In Proc. crypto\u201989 (lncs 435), pp. 307\u2013315, 1989."},{"key":"BF03253323_CR14","first-page":"457","volume-title":"Advances in Cryptology \u2014 Crypto\u201991","author":"Y. Desmedt","year":"1992","unstructured":"Desmedt Y., Frankel Y., Shared generation of authenticators and signatures, In Advances in Cryptology \u2014 Crypto\u201991, Proceedings (Lecture Notes in Computer Science 576), pp. 457\u2013469. Springer-Verlag, 1992."},{"issue":"2","key":"BF03253323_CR15","first-page":"99","volume":"3","author":"S. Haber","year":"1991","unstructured":"Haber S., Stornetta W.S.)\n                  How to Time-Stamp a Digital Document, Journal of Cryptology: the Journal of the International Association for Cryptologic Research 32), pp. 99\u2013112, 1991.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253323_CR16","volume-title":"Some Timestamping Protocol Failures","author":"M. Just","year":"1998","unstructured":"Just M., Some Timestamping Protocol Failures, Internet Society Symposium on Network and Distributed System Security, San Diego, CA, Mar 11-13, 1998."},{"key":"BF03253323_CR17","volume-title":"Secrecy, authentication, and public key systems","author":"P. Merkle","year":"1979","unstructured":"Merkle P., Secrecy, authentication, and public key systems, Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ., 1979."},{"key":"BF03253323_CR18","series-title":"CoRR cs.DC\/0","volume-title":"Enabling the Long-Term Archival of Signed Documents through time-stamping","author":"P. Maniatis","year":"2001","unstructured":"Maniatis P., Giuli T.J., Baker M.)\n                  Enabling the Long-Term Archival of Signed Documents through time-stamping, CoRR cs.DC\/0 106058: (2001)."},{"key":"BF03253323_CR19","first-page":"178","volume-title":"Proceedings of ieee 8th International Workshops on enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 Fourth International Workshop on Enterprise Security","author":"H. Massias","year":"1999","unstructured":"Massias H., Serret X., Quisquater J., Timestamps: Main issues on their use and implementation. In Proceedings of ieee 8th International Workshops on enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 Fourth International Workshop on Enterprise Security, pp. 178\u2013183, June 1999. ISBN 0-7695-0365-9."},{"key":"BF03253323_CR20","first-page":"178","volume-title":"Proceedings of ieee 8th International Workshops on enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 Fourth International Workshop on Enterprise Security","author":"H. Massias","year":"1999","unstructured":"Massias H., Quisquater J., Timestamps: Main issues on their use and implementation, In Proceedings of ieee 8th International Workshops on enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 Fourth International Workshop on Enterprise Security, pages 178\u2013183, June 1999. ISBN 0-7695-0365-9."},{"key":"BF03253323_CR21","volume-title":"Quartz, 128-bit long digital signatures, nessie","author":"J. Patarin","year":"2000","unstructured":"Patarin J., Courtois N., Goubin L., Quartz, 128-bit long digital signatures, nessie sub-mission, 2000. Available online at http:\/\/www.cryptonessie.org\/."},{"issue":"6","key":"BF03253323_CR22","first-page":"668","volume":"33","author":"W. Pugh","year":"1990","unstructured":"Pugh W., Skip Lists: Skip lists: A probabilistic alternative to balanced trees, Communications of the ACM, 336), pp. 668\u2013676, June 1990.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253323_CR23","first-page":"89","volume-title":"A Simplified Approach to Threshold and Proactive rsa, crypto","author":"T. Rabin","year":"1998","unstructured":"Rabin T., A Simplified Approach to Threshold and Proactive\n                  rsa, crypto 1998, pp. 89\u2013104."},{"key":"BF03253323_CR24","volume-title":"Practical threshold signatures, Eurocrypt 00","author":"V. Shoup","year":"2000","unstructured":"Shoup V., Practical threshold signatures, Eurocrypt 00, 2000."},{"key":"BF03253323_CR25","series-title":"Proceedings of iws","first-page":"123","volume-title":"A Secure and trusted Time Stamping Authority","author":"A. Takura","year":"1999","unstructured":"Takura A., Ono S., Naito S., A Secure and trusted Time Stamping Authority, Proceedings of iws 99, 1999, pp. 123\u2013128."},{"key":"BF03253323_CR26","series-title":"Cryptology ePrint Archive, Report","volume-title":"A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups","author":"V. K. Wei","year":"2004","unstructured":"Wei V. K., A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups, Cryptology ePrint Archive, Report 2004\/039"},{"key":"BF03253323_CR27","series-title":"Cryptology ePrint Archive, Report","volume-title":"Attack on Han et al\u2019s id-based Confirmer (Undeniable) Signature at acm-ec\u201903","author":"E. Zhang","year":"2003","unstructured":"Zhang E., Safavi-Naini R., Susilo W., Attack on Han et al\u2019s\n                  id-based Confirmer (Undeniable) Signature at\n                  acm-ec\u201903, Cryptology ePrint Archive, Report 2003\/129."}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253323.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03253323\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253323.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T07:43:43Z","timestamp":1625643823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03253323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":27,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["BF03253323"],"URL":"https:\/\/doi.org\/10.1007\/bf03253323","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}