{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:02Z","timestamp":1725454322802},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000437","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"224-237","source":"Crossref","is-referenced-by-count":21,"title":["Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Horster","sequence":"first","affiliation":[]},{"given":"Markus","family":"Michels","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Petersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"18_CR1","first-page":"38","volume-title":"Lecture Notes in Computer Science 434","author":"F. Bauspie\u00df","year":"1990","unstructured":"F.Bauspie\u00df, H.-J.Knobloch, \u201dHow to keep authenticity alive in a computer network\u201d, Lecture Notes in Computer Science 434, Advances in Cryptology: Proc. Eurocrypt '89, Berlin: Springer Verlag, (1990), pp. 38\u201346."},{"key":"18_CR2","first-page":"63","volume-title":"Lecture Notes in Computer Science 473","author":"E.F. Brickell","year":"1991","unstructured":"E.F.Brickell, K.S.McCurley, \u201dAn Interactive Identification scheme based on discrete logarithms and factoring\u201d, Lecture Notes in Computer Science 473, Advances in Cryptology: Proc. Eurocrypt '90, Berlin: Springer Verlag, (1991), pp. 63\u201371."},{"key":"18_CR3","first-page":"308","volume-title":"Lecture Notes in Computer Science 839","author":"M. Burmester","year":"1994","unstructured":"M.Burmester, \u201dOn the risk of opening distributed keys\u201d, Lecture Notes in Computer Science 839, Advances in Cryptology: Proc. Crypto '94, Berlin: Springer Verlag, (1994), pp. 308\u2013317."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"J.L.Camenisch, J.-M.Piveteau, M.A.Stadler, \u201dBlind signature schemes based on the discrete logarithm problem\u201d, Preprint, presented at the Rump session of Eurocrypt '94, (1994), 5 pages.","DOI":"10.1007\/BFb0053458"},{"key":"18_CR5","first-page":"199","volume-title":"Blind signatures for untraceable payments","author":"D. Chaum","year":"1983","unstructured":"D. Chaum, \u201dBlind signatures for untraceable payments\u201d, Advances in Cryptology: Proc. Crypto '82, New York: Plenum Press, (1983), pp. 199\u2013203."},{"key":"18_CR6","first-page":"127","volume-title":"Lecture Notes in Computer Science 304","author":"D. Chaum","year":"1988","unstructured":"D.Chaum, J.H.Evertse, J.van deGraaf, \u201dDemonstrating possession of a discrete logarithms and some generalizations\u201d, Lecture Notes in Computer Science 304, Advances in Cryptology: Proc. Eurocrypt '87, Berlin: Springer Verlag, (1988), pp. 127\u2013141."},{"issue":"No.6","key":"18_CR7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W.Diffie, M.Hellman,\u201dNew directions in cryptography\u201d, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November, (1976), pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR8","volume-title":"UMI Order No. DA 8420519","author":"T. ElGamal","year":"1984","unstructured":"T.ElGamal, \u201dCryptography and logarithms over finite fields\u201d, Stanford University, CA., UMI Order No. DA 8420519, (1984), 119 pages."},{"issue":"No.4","key":"18_CR9","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-30","author":"T. ElGamal","year":"1985","unstructured":"T.ElGamal, \u201dA public key cryptosystem and a signature scheme based on discrete logarithms\u201d, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July, (1985), pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR10","first-page":"490","volume-title":"Lecture Notes in Computer Science 547","author":"M. Girault","year":"1991","unstructured":"M.Girault, \u201dSelf-Certified Public Keys\u201d, Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt '91, Berlin: Springer Verlag, (1991), pp. 490\u2013497."},{"key":"18_CR11","first-page":"29","volume-title":"Lecture Notes in Computer Science 434","author":"C.G. G\u00fcnther","year":"1990","unstructured":"C.G.G\u00fcnther, \u201dAn identity based key exchange protocol\u201d, Lecture Notes in Computer Science 434, Advances in Cryptology: Proc. Eurocrypt '89, Berlin: Springer Verlag, (1990), pp. 29\u201337."},{"key":"18_CR12","first-page":"399","volume-title":"Lecture Notes in Computer Science 547","author":"P. Horster","year":"1992","unstructured":"P.Horster, H.-J.Knobloch, \u201dDiscrete Logarithm based protocols\u201d, Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt '91, Berlin: Springer Verlag, (1992), pp. 399\u2013408."},{"issue":"No.15","key":"18_CR13","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1049\/el:19940856","volume":"30","author":"P. Horster","year":"1994","unstructured":"P.Horster, M.Michels, H.Petersen, \u201dAuthenticated encryption schemes with low communication costs\u201d, Electronics Letters, Vol. 30, No. 15, July, (1994), pp. 1230\u20131231.","journal-title":"Electronics Letters"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"P.Horster, M.Michels, H.Petersen, \u201dGeneralized ElGamal signature schemes for one message block\u201d, Proc. 2nd Int. Workshop on IT-Security, Vienna, Sep. 22.\u201323., (1994), 16 pages.","DOI":"10.1145\/191177.191197"},{"key":"18_CR15","unstructured":"P.Horster, M.Michels, H.Petersen, \u201dMeta signature schemes giving message recovery based on the discrete logarithm problem\u201d, Proc. 2. Int. Workshop on IT-Security, Wien, Sep. 22.\u201323., (1994), 12 pages."},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"P.Horster, M.Michels, H.Petersen, \u201dMeta-ElGamal signature schemes\u201d, Proc. 2nd ACM conference on Computer and Communications security, Fairfax, Virginia, Nov. 2\u20134, (1994), pp. 96\u2013107.","DOI":"10.1145\/191177.191197"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"P.Horster, M.Michels, H.Petersen, \u201dMeta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications\u201d, (Full version), Technical Report TR-94-9, University of Technology Chemnitz-Zwickau, June, (1994), 22 pages.","DOI":"10.1007\/BFb0000437"},{"key":"18_CR18","first-page":"89","volume-title":"Generalized ElGamal-signatures","author":"P. Horster","year":"1994","unstructured":"P.Horster, H.Petersen, \u201dGeneralized ElGamal-signatures\u201d (in German), Sicherheit in Informationssystemen, Proceedings of SIS '94, Zurich, March 10\u201311, 1994, Verlag der Fachvereine Z\u00fcrich, (1994), pp. 89\u2013106."},{"key":"18_CR19","volume-title":"Technical Report TR-94-1","author":"P. Horster","year":"1994","unstructured":"P.Horster, H.Petersen, \u201dClassification of blind signature schemes and examples of hidden and weak blind signatures\u201d, Technical Report TR-94-1, University of Technology Chemnitz-Zwickau, Presented at the Rump Session of Eurocrypt '94, Perugia, Italy, (1994), 6 pages."},{"key":"18_CR20","unstructured":"H.-J.Knobloch, \u201dA remark on the size of ElGamal-type digital signatures\u201d, EISS Report 94\/1, European Institute for System Security (EISS), University of Karlsruhe, (1994), 5 pages."},{"key":"18_CR21","unstructured":"C.H.Lim, E-mail to the authors, August 20, (1994)."},{"key":"18_CR22","unstructured":"National Institute of Standards and Technology, Federal Information Process. Standard, FIPS Pub XX: Digital Signature Standard (DSS), (1991)."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"K.Nyberg, R.Rueppel, \u201dA new signature scheme based on the DSA giving message recovery\u201d, Proc. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, Nov. 3\u20135., (1993), 4 pages.","DOI":"10.1145\/168588.168595"},{"key":"18_CR24","first-page":"175","volume-title":"Pre-proceedings of Eurocrypt '94","author":"K. Nyberg","year":"1994","unstructured":"K.Nyberg, R.Rueppel, \u201dMessage recovery for signature schemes based on the discrete logarithm problem\u201d, Pre-proceedings of Eurocrypt '94, University of Perugia, Italy, (1994), pp. 175\u2013190."},{"key":"18_CR25","first-page":"31","volume-title":"Lecture Notes in Computer Science 740","author":"T. Okamoto","year":"1993","unstructured":"T.Okamoto, \u201dProvable secure and practical identification schemes and corresponding signature schemes\u201d, Lecture Notes in Computer Science 740, Advances in Cryptology: Proc. Crypto '92, Berlin: Springer Verlag, (1993), pp. 31\u201353."},{"key":"18_CR26","first-page":"239","volume-title":"Lecture Notes in Computer Science 435","author":"C.P. Schnorr","year":"1990","unstructured":"C.P.Schnorr, \u201dEfficient identification and signatures for smart cards\u201d, Lecture Notes in Computer Science 435, Advances in Cryptology: Proc. Crypto '89, Berlin: Springer Verlag, (1990), pp. 239\u2013251."},{"key":"18_CR27","first-page":"344","volume-title":"Lecture Notes in Computer Science 435","author":"Y. Yacobi","year":"1990","unstructured":"Y.Yacobi, Z.Shmuely, \u201dOn key distribution systems\u201d, Lecture Notes in Computer Science 435, Advances in Cryptology: Proc. Crypto '89, Berlin: Springer Verlag, (1990), pp. 344\u2013355."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:02Z","timestamp":1586499482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000437"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/bfb0000437","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}