{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:20:42Z","timestamp":1776273642805,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540633846","type":"print"},{"value":"9783540695288","type":"electronic"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052225","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T18:37:31Z","timestamp":1155839851000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":297,"title":["Statistical zero knowledge protocols to prove modular polynomial relations"],"prefix":"10.1007","author":[{"given":"Eiichiro","family":"Fujisaki","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"G.Brassard, D.Chaum, and C.Cr\u00e9peau, \u201cMinimum Disclosure Proofs of Knowledge,\u201d Journal of Computer and System Sciences, Vol.37, pp.156\u2013189 (1988)","journal-title":"Journal of Computer and System Sciences"},{"key":"2_CR2","first-page":"390","volume":"92","author":"M. Bellare","year":"1992","unstructured":"Bellare, M. and Goldreich, O., \u201cOn Defining Proofs of Knowledge\u201d, Proceedings of Crypto 92, pp.390\u2013420 (1992).","journal-title":"Proceedings of Crypto"},{"key":"2_CR3","first-page":"231","volume":"95","author":"S. Brands","year":"1995","unstructured":"Brands, S., \u201cRestrictive Blinding of Secret-Key Certificates\u201d, Proceedings of Eurocrypt 95, pp.231\u2013247 (1995).","journal-title":"Proceedings of Eurocrypt"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damg\u00e5rd, I. and Schoenmakers, B., \u201cProofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols\u201d, Proc. of Crypto'94, LNCS, Springer, pp.174\u2013187 (1994)","DOI":"10.1007\/3-540-48658-5_19"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B., \u201cVerifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults\u201d, Proc. of FOCS, pp.383\u2013395 (1985).","DOI":"10.1109\/SFCS.1985.64"},{"key":"2_CR6","unstructured":"Damg\u00e5rd, I., \u201cPractical and Provably Secure Release of a Secret and Exchange of Signatures,\u201d Proceedings of Eurocrypt 93 (1993)."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00191356","volume":"8","author":"I. Damg\u00e5rd","year":"1995","unstructured":"Damg\u00e5rd, I., \u201cPractical and Provably Secure Release of a Secret and Exchange of Signatures,\u201d vol. 8 pp.201\u2013222, Journal of CRYPTOLOGY(1995).","journal-title":"Journal of CRYPTOLOGY"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U.Feige, A.Fiat and A.Shamir, \u201cZero Knowledge Proofs of Identity,\u201d Journal of Cryptology, Vol. 1, pp.77\u201394 (1988).","journal-title":"Journal of Cryptology"},{"key":"2_CR9","unstructured":"U.Feige, and A.Shamir, \u201cWitness Indistinguishable and Witness Hiding Protocols,\u201d Proc. of STOC90."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., and Rackoff, C., \u201cThe knowledge complexity of interactive proof systems\u201d, SIAM J. Comput., vol.18, pp.186\u2013208 (1989).","journal-title":"SIAM J. Comput."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"O.Goldreich, S.Micali, and A.Wigderson, \u201cProofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design,\u201d Proc. FOCS, pp.174\u2013187 (1986)","DOI":"10.1109\/SFCS.1986.47"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G.L. Miller","year":"1976","unstructured":"Miller, G.L., \u201cRiemann's Hypothesis and Tests for Primality\u201d, Journal of Computer and System Sciences 13, 300\u2013317 (1976).","journal-title":"Journal of Computer and System Sciences"},{"key":"2_CR13","first-page":"438","volume":"95","author":"T. Okamoto","year":"1995","unstructured":"Okamoto, T., \u201cAn Efficient Divisible Electronic Cash Scheme\u201d, Proceedings of Crypto 95, pp.438\u2013451 (1995).","journal-title":"Proceedings of Crypto"},{"key":"2_CR14","first-page":"129","volume":"91","author":"T. P. Pedersen","year":"1992","unstructured":"Pedersen, T. P., \u201cNon-Interactive and Information-Theoretic Secure Verifiable Secret Sharing\u201d, Proceedings of Crypto 91, pp. 129\u2013140 (1992).","journal-title":"Proceedings of Crypto"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Stadler, M., \u201cPublicly Verifiable Secret Sharing\u201d, Proc. of Eurocrypt'96, LNCS 1070, Springer, pp.190\u2013199 (1996)","DOI":"10.1007\/3-540-68339-9_17"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Tompa, M., and Woll, H., \u201cRandom Self-Reducibility and Zero-Knowledge Interactive-Proofs of Possession of Information\u201d, Proc. FOCS, pp 472\u2013482 (1987).","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '97"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T03:23:43Z","timestamp":1580354623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540633846","9783540695288"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/bfb0052225","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"17 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}