{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:51:50Z","timestamp":1725454310025},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000420","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"1-17","source":"Crossref","is-referenced-by-count":0,"title":["Multifeature security through homomorphic encryption"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Beth","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"1_CR1","unstructured":"L. M. Adleman, J. DeMarrais: A Subexponential Algorithm for Discrete Logarithms over all Finite Fields, Santa Barbara, Crypto '93, Preprints"},{"key":"1_CR2","volume-title":"Technical Memo","author":"C. I'Anson","year":"1990","unstructured":"C. I'Anson, C. J. Mitchell: Security Defects in CCITT Recommendation X.509, Technical Memo, HP Labs, Bristol, Jan. 1990"},{"key":"1_CR3","unstructured":"F. Bauspie\u00df: SELANE, Studienarbeit, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, 1988"},{"key":"1_CR4","series-title":"LNCS 434","first-page":"38","volume-title":"Eurocrypt '89, Advances in Cryptology","author":"F. Bauspie\u00df","year":"1989","unstructured":"F. Bauspie\u00df, H.-J. Knobloch: How to keep Authenticity Alive in a Computer Network, Eurocrypt '89, Advances in Cryptology, LNCS 434, Springer-Verlag, Berlin, 1989, pp. 38\u201346"},{"key":"1_CR5","series-title":"LNCS 330","first-page":"77","volume-title":"Eurocrypt '88, Advances in Cryptology","author":"T. Beth","year":"1988","unstructured":"Th. Beth: Efficient Zero-Knowledge Identification Scheme for Smart Cards, Eurocrypt '88, Advances in Cryptology, LNCS 330, Springer-Verlag, Berlin, 1988, pp. 77\u201384"},{"key":"1_CR6","unstructured":"Th. Beth, G. Agnew, S. A. Vanstone: What one should know about Public Key Algorithms \u2014Today!, Proceedings SECURICOM '90."},{"issue":"No.4","key":"1_CR7","first-page":"458","volume":"7","author":"T. Beth","year":"1989","unstructured":"Th. Beth, D. Gollmann: Algorithm Engineering for Public Key Algorithms, IEEE JSAC, Vol. 7, No. 4, pp. 458\u2013466, 1989","journal-title":"IEEE JSAC"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Th. Beth, H.-J. Knobloch, M. Otten: Verifiable Secret Sharing for Monotone Access Structures, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, November 1993, to be published","DOI":"10.1145\/168588.168612"},{"key":"1_CR9","series-title":"LNCS 547","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-46416-6_27","volume-title":"Eurocrypt '91, Advances in Cryptology","author":"T. Beth","year":"1991","unstructured":"Th. Beth, F. Schaefer: Non-Supersingular Elliptic Curves for Public Key Cryptosystems, Eurocrypt '91, Advances in Cryptology, LNCS 547, Springer-Verlag, Berlin, 1991 pp. 316\u2013327"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, R. Needham: A Logic of Authentication, DEC-SRC, Research Report Series No. 39, 1989","DOI":"10.1145\/74850.74852"},{"key":"1_CR11","series-title":"LNCS 304","first-page":"127","volume-title":"Eurocrypt '87, Advances in Cryptology","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, J.-H. Evertse, J. van de Graaf: An Improved Protocol for Demonstrating Possession of a Discrete Logarithm and Some Generalizations, Eurocrypt '87, Advances in Cryptology, LNCS 304, Springer-Verlag, Berlin, 1988, pp. 127\u2013141"},{"key":"1_CR12","unstructured":"A. Tarah, C. Huitema: CHIMAERA: A Network Security Model, Proc. ESORICS '90, afcet, 1990, pp. 127\u2013145"},{"key":"1_CR13","first-page":"664","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. E. Hellman: New Directions in Cryptography, IEEE Trans. Inf. Theory, IT-22, 1976, pp. 664\u2013654","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR14","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal: A public key crypto-system and signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory, IT-31, 1985, 469\u2013472.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR15","series-title":"LNCS 434","first-page":"29","volume-title":"Eurocrypt '89, Advances in Cryptology","author":"C. G\u00fcnther","year":"1989","unstructured":"C. G\u00fcnther: Diffie-Hellman and El-Gamal Protocols With One Single Authentication Key, Eurocrypt '89, Advances in Cryptology, LNCS 434, Springer-Verlag, Berlin, 1989, pp. 29\u201337"},{"key":"1_CR16","series-title":"LNCS 547","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-46416-6_34","volume-title":"Eurocrypt '91, Advances in Cryptology","author":"P. Horster","year":"1991","unstructured":"P. Horster, H.-J. Knobloch: Discrete Logarithm Based Protocols, Eurocrypt '91, Advances in Cryptology, LNCS 547, Springer-Verlag, Berlin, 1991, pp. 399\u2013408"},{"key":"1_CR17","unstructured":"ITSEC: Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, Brussels, 1991"},{"key":"1_CR18","unstructured":"Network Working Group J. Kohl, B. C. Neumann, J. Steiner: MIT Project Athena: The Kerberos Network Authentication Service, Draft 2, MIT, November 1989"},{"key":"1_CR19","unstructured":"B. Klein: Authentifikationsdienste f\u00fcr sichere Informationssysteme, Dissertation, Universit\u00e4t Karlsruhe, 1993, to be published"},{"key":"1_CR20","series-title":"LNCS 209","first-page":"224","volume-title":"Eurocrypt '84, Advances in Cryptology","author":"A. M. Odlyzko","year":"1985","unstructured":"A. M. Odlyzko: Discrete logarithms in finite fields and their cryptographic significance, Eurocrypt '84, Advances in Cryptology, LNCS 209, Springer-Verlag, Berlin, 1985, pp. 224\u2013314"},{"key":"1_CR21","unstructured":"M. Otten: Mehrparteienprotokolle und Korrektes Verteilen von Geheimnissen, Diplomarbeit, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, 1992"},{"key":"1_CR22","unstructured":"C. Otto: SELANE-Hardwareentwicklung, Diplomarbeit, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, 1990"},{"key":"1_CR23","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S. C. Pohlig","year":"1978","unstructured":"S. C. Pohlig, M. E. Hellman: An improved algorithm for computing logarithms in GF(p) and its cryptographic significance, IEEE Trans. Inf. Theory, IT-24, 1978, pp. 106\u2013111","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR24","unstructured":"F. Schaefer-Lorinser: Arithmetik auf elliptischen Kurven zur Konstruktion kryptographischer Einwegfunktionen, Dissertation, Universit\u00e4t Karlsruhe, 1993"},{"key":"1_CR25","series-title":"LNCS 435","first-page":"239","volume-title":"Crypto '89, Advances in Cryptology","author":"C. P. Schnorr","year":"1989","unstructured":"C. P. Schnorr: Efficient Identification and Signatures for Smart Cards, Crypto '89, Advances in Cryptology, LNCS 435, Springer-Verlag, Berlin, 1989, pp. 239\u2013252"},{"key":"1_CR26","unstructured":"G. J. Simmons, W.-A. Jackson, K. Martin: The Geometry of Shared Secret Schemes, Bulletin of the Institute of Combinatorics, Winnipeg Canada, January 1991"},{"key":"1_CR27","unstructured":"S. Stempel: SELANE Pilot-Implementierung, Diplomarbeit, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, 1990"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"R. Yahalom, B. Klein, Th. Beth: Trust Relationships in Secure Systems \u2014 A Distributed Authentication Perspective, Proceedings of the IEEE Conference on Research in Security and Privacy, 1993.","DOI":"10.1109\/RISP.1993.287635"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:02Z","timestamp":1586499482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/bfb0000420","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}