{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:14:10Z","timestamp":1775229250053,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055722","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"89-104","source":"Crossref","is-referenced-by-count":134,"title":["A simplified approach to threshold and proactive RSA"],"prefix":"10.1007","author":[{"given":"Tal","family":"Rabin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Crypto '97, pages 425\u2013439, 1997. Springer-Verlag. LNCS No. 1294.","DOI":"10.1007\/BFb0052253"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Noncryptographic Fault-Tolerant Distributed Computations. In Proc. 20th Annual Symp. on the Theory of Computing, pages 1\u201310. ACM, 1988.","DOI":"10.1145\/62212.62213"},{"key":"7_CR3","unstructured":"C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241\u2013246. Claredon Press, 1989."},{"issue":"1","key":"7_CR4","first-page":"1","volume":"3","author":"R. Canetti","year":"1997","unstructured":"R. Canetti, R. Gennaro, A. Herzberg, and D. Naor. Proactive Security: Long-term Protextion Against Break-ins. CryptoBytes, 3(1):1\u20138, 1997.","journal-title":"CryptoBytes"},{"key":"7_CR5","unstructured":"R. A. Croft and S. P. Harris. Public-key cryptography and re-usable shared secrets. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 189\u2013201. Claredon Press, 1989."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"R. Canetti and Amir Herzberg. Maintaining security in the presence of transient faults. Crypto '94, pages 425\u2013438, 1994. Springer-Verlag. LNCS No. 839.","DOI":"10.1007\/3-540-48658-5_38"},{"issue":"4","key":"7_CR7","first-page":"532","volume":"E76-A","author":"M. Cerecedo","year":"1993","unstructured":"M. Cerecedo, T. Matsumoto, and H. Imai. Efficient and secure multiparty generation of digital signatures based on discrete logarithms. IEIGE Trans. Fundamentals, E76-A(4):532\u2013545, 1993.","journal-title":"IEIGE Trans. Fundamentals"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Alfredo De Santis, Yvo Desmedt, Yair Frankel, and Moti Yung. How to share a function securely. In Proc. 26th Annual Symp. on the Theory of Computing, pages 522\u2013533. ACM, 1994.","DOI":"10.1145\/195058.195405"},{"key":"7_CR9","first-page":"120","volume-title":"LNCS No. 293","author":"Y. Desmedt","year":"1987","unstructured":"Yvo Desmedt. Society and group oriented cryptography: A new concept. In Crypto '87, pages 120\u2013127, Berlin, 1987. Springer-Verlag. LNCS No. 293."},{"issue":"4","key":"7_CR10","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. G. Desmedt","year":"1994","unstructured":"Yvo G. Desmedt. Threshold cryptography. European Transactions on Telecommunications, 5(4):449\u2013457, July 1994.","journal-title":"European Transactions on Telecommunications"},{"key":"7_CR11","first-page":"307","volume-title":"LNCS No. 435","author":"Y. Desmedt","year":"1989","unstructured":"Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology \u2014 Crypto '89, pages 307\u2013315, Berlin, 1989. Springer-Verlag. LNCS No. 435."},{"key":"7_CR12","first-page":"457","volume-title":"LNCS No. 576","author":"Y. Desmedt","year":"1991","unstructured":"Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Advances in Cryptology \u2014 Crypto '91, pages 457\u2013469, Berlin, 1991. Springer-Verlag. LNCS No. 576."},{"key":"7_CR13","unstructured":"Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Tech. Report ISSE-TR-97-01, George Mason University, July 1997. ftp:\/\/isse.gmu.edu\/pub\/techrep\/97_01_jajodia.ps.gz."},{"key":"7_CR14","unstructured":"Yair Frankel and Yvo Desmedt. Parallel reliable threshold multisignature. TR-92-04-02, April, Dept. of EE and CS, U of Wisconsin, 1992."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"P. Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In Proc. 28th Annual FOCS, pages 427\u2013437. IEEE, 1987.","DOI":"10.1109\/SFCS.1987.4"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Yair Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Proactive RSA. In Crypto '97, pages 440\u2013454, 1997. Springer-Verlag. LNCS No. 1294.","DOI":"10.1007\/BFb0052254"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Optimal resilience proactive public-key cryptosystems. In Proc. 38th FOCS, pages 384\u2013393. IEEE, 1997.","DOI":"10.1109\/SFCS.1997.646127"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Y. Frankel, P. Gemmell, and M. Yung. Witness-based Cryptographic Program Checking and Robust Function Sharing. In Proc. 28th STOC, pages 499\u2013508. ACM, 1996.","DOI":"10.1145\/237814.237998"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine Agreement. In Proc. 20th STOC, pages 148\u2013161. ACM, 1988.","DOI":"10.1145\/62212.62225"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Y. Frankel. A practical protocol for large group oriented networks. In Eurocrypt '89, pages 56\u201361, 1989. Springer-Verlag. LNCS No. 434.","DOI":"10.1007\/3-540-46885-4_8"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure faut-tolerant protocols and the public-key model. In Crypto '87, pages 135\u2013155, 1987. Springer-Verlag. LNCS No. 293.","DOI":"10.1007\/3-540-48184-2_10"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Eurocrypt '96, pages 354\u2013371, 1996. Springer-Verlag. LNCS No. 1070.","DOI":"10.1007\/3-540-68339-9_31"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Crypto '96, pages 157\u2013172, 1996. Springer-Verlag. LNCS No. 1109.","DOI":"10.1007\/3-540-68697-5_13"},{"issue":"5","key":"7_CR24","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","volume":"141","author":"L. Harn","year":"1994","unstructured":"L. Harn. Group oriented (t,n) digital signature scheme. IEE Proc.-Comput.Digit.Tech, 141(5):307\u2013313, Sept 1994.","journal-title":"IEE Proc.-Comput.Digit.Tech"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"[HJJ+97] Amir Herzberg, M. Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In 1997 ACM Conference on Computers and Communication Security, 1997.","DOI":"10.1145\/266420.266442"},{"key":"7_CR26","unstructured":"M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive RSA for Constant-Size Thresholds. Upublished manuscript, 1995."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th PODC, pages 51\u201359. ACM, 1991.","DOI":"10.1145\/112600.112605"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T09:09:06Z","timestamp":1555751346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/bfb0055722","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}