{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:03Z","timestamp":1725454323984},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000434","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"182-192","source":"Crossref","is-referenced-by-count":0,"title":["Zero-knowledge proofs of computational power in the shared string model"],"prefix":"10.1007","author":[{"given":"Alfredo","family":"De Santis","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"issue":"no.6","key":"15_CR1","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"M. Blum","year":"1991","unstructured":"M. Blum, A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero Knowledge, SIAM Journal of Computing, vol. 20, no. 6, pp. 1084\u20131118, December 1991.","journal-title":"SIAM Journal of Computing"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, and S. Micali, Non-Interactive Zero-Knowledge Proof Systems and Applications, Proceedings of the 20th Annual ACM Symposium on Theory of Computing, Chicago, Illinois, 1988, pp. 364\u2013383.","DOI":"10.1145\/62212.62222"},{"key":"15_CR3","unstructured":"M. Bellare, and O. Goldreich, On Defining Proofs of Knowledge, in Proc. of Crypto '92."},{"key":"15_CR4","unstructured":"A. De Santis, G. Di Crescenzo, and G. Persiano, Secret Sharing and Perfect Zero Knowledge, in Proc. of Crypto '93."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero-Knowledge Proof Systems, in \u201cAdvances in Cryptology \u2014 CRYPTO 87\u201d, vol. 293 of \u201cLecture Notes in Computer Science\u201d, Springer Verlag, pp. 52\u201372.","DOI":"10.1007\/3-540-48184-2_5"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero-Knowledge Proof-Systems with Preprocessing, in \u201cAdvances in Cryptology \u2014 CRYPTO 88\u201d, Ed. S. Goldwasser, vol. 403 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 269\u2013282.","DOI":"10.1007\/0-387-34799-2_21"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"A. De Santis, and G. Persiano, Zero-Knowledge Proofs of Knowledge Without Interaction, Proceedings of the 33rd Annual IEEE Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, 1992, pp. 427\u2013436.","DOI":"10.1109\/SFCS.1992.267809"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"A. De Santis and M. Yung, Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems, in \u201cAdvances in Cryptology \u2014 CRYPTO 90\u201d, Ed. A.J. Menezes and S.A. Vanstone, vol. 537 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 366\u2013377.","DOI":"10.1007\/3-540-38424-3_27"},{"key":"15_CR9","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"S. Even, O. Goldreich, and A. Lempel, A Randomized Protocol for Signing Contracts, CACM, vol. 28, 1985, pp. 637\u2013647.","journal-title":"CACM"},{"key":"15_CR10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir, Zero-knowledge Proofs of Identity, Journal of Cryptology, vol. 1, 1988, pp. 77\u201394. (Preliminary version in Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 1987, pp. 210\u2013217.)","journal-title":"Journal of Cryptology"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"U. Feige, D. Lapidot, and A. Shamir, Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String, in Proceedings of 22nd Annual Symposium on the Theory of Computing, 1990, pp. 308\u2013317.","DOI":"10.1109\/FSCS.1990.89549"},{"key":"15_CR12","unstructured":"M. Fischer, S. Micali, and C. Rackoff, A Secure Protocol for the Oblivious Transfer, Eurocrypt 1984."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM Journal on Computing, vol. 18, n. 1, February 1989.","DOI":"10.1137\/0218012"},{"issue":"no.1","key":"15_CR14","first-page":"691","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, vol. 38, no. 1, July 1991, pp. 691\u2013729.","journal-title":"Journal of the ACM"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"T. Okamoto, D. Chaum, and K. Ohta, Direct Zero Knowledge Proofs of Computational Power in Five Rounds, in \u201cAdvances in Cryptology \u2014 EUROCRYPT\u2019 91', Ed. D. W. Davies, vol. 547 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 96\u2013105.","DOI":"10.1007\/3-540-46416-6_8"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll, Random Self-Reducibility and Zero-knowledge Interactive Proofs of Possession of Information, Proceedings of 28rd Symposium on Foundations of Computer Science, 1987, pp. 472\u2013482.","DOI":"10.1109\/SFCS.1987.49"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"M. Yung, Zero-Knowledge Proofs of Computational Power, in \u201cAdvances in Cryptology \u2014 EUROCRYPT\u2019 89', Ed. J. J. Quisquater and J. Vandewalle, vol. 434 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 196\u2013207.","DOI":"10.1007\/3-540-46885-4_22"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T02:17:54Z","timestamp":1586485074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0000434","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}