{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:49Z","timestamp":1725456349609},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028169","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"191-200","source":"Crossref","is-referenced-by-count":7,"title":["Threshold key-recovery systems for RSA"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"15_CR1","first-page":"313","volume":"48","author":"G.R. Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding Cryptographic Keys, Proc. of AFIPS 1979 Nat. Computer Conf., vol.48, pp.313\u2013317 (Sep. 1979)","journal-title":"Safeguarding Cryptographic Keys, Proc. of AFIPS 1979 Nat. Computer Conf."},{"key":"15_CR2","unstructured":"Blum, M.: Coin Flipping by Telephon, Proc. of COMPCON, IEEE, pp. 133\u2013137 (1982)."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Brickell, E., Chaum, D., DamgArd, I. and van de Graaf, Gradual and Verifiable Release of a Secret, Proc. of Crypto 87, LNCS, Springer-Verlag (1988).","DOI":"10.1007\/3-540-48184-2_11"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B.: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, Proc. of FOCS, pp.383\u2013395 (1985).","DOI":"10.1109\/SFCS.1985.64"},{"key":"15_CR5","unstructured":"Damg\u00e5rd, I.: Practical and Provably Secure Release of a Secret and Exchange of Signatures, Proc. of Eurocrypt'93, LNCS 765, Springer-Verlag, pp.200\u2013217 (1994)."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing, Proc. of FOCS'87, pp.427\u2013437 (1987).","DOI":"10.1109\/SFCS.1987.4"},{"key":"15_CR7","unstructured":"Fiat, A. and Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proc. of Crypto'86, LNCS 263, Springer-Verlag, pp. 186\u2013194 (1986)."},{"key":"15_CR8","unstructured":"Micali, S.: Fair Public-Key Cryptosystems, Proc. of Crypto'92, LNCS, Springer-Verlag, pp.113\u2013138 (1993)."},{"key":"15_CR9","unstructured":"Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Proc. of Crypto'92, LNCS 740, Springer-Verlag, pp.31\u201353 (1993)."},{"key":"15_CR10","unstructured":"Okamoto, T.: An Efficient Divisible Electronic Cash Scheme, Proc. of Crypto'95, LNCS 963, Springer-Verlag, pp.438\u2013451 (1995)."},{"key":"15_CR11","unstructured":"Pedersen, T. P.: Distributed Provers with Applications to Undeniable Sigantures, Proc. of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.221\u2013242 (1991)."},{"key":"15_CR12","unstructured":"Pedersen, T. P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. of Crypto'91, LNCS 576, Springer-Verlag, pp. 129\u2013140 (1992)."},{"issue":"11","key":"15_CR13","first-page":"612","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret, Comm. Assoc. Comput. Mach., vol.22, no.11, pp.612\u2013613 (Nov. 1979)","journal-title":"Comm. Assoc. Comput. Mach."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:48:38Z","timestamp":1586573318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0028169","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}