{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:52:47Z","timestamp":1766047967361},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055727","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"169-185","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":107,"title":["Identity escrow"],"prefix":"10.1007","author":[{"given":"Joe","family":"Kilian","sequence":"first","affiliation":[]},{"given":"Erez","family":"Petrank","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"12_CR1","unstructured":"Asokan, Shoup and Waidner. Optimistic Fair Exchange of Digital Signatures. IBM Research Report RZ2973, November 17, 1997."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and S. Goldwasser. Verifiable partial key escrow. Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997. Preliminary version appeared as Technical Report CS95-447, Dept. of CS and Engineering, UCSD, October 1995.","DOI":"10.1145\/266420.266439"},{"key":"12_CR3","unstructured":"M. Bellare and S. Goldwasser. Encapsulated key escrow. MIT Laboratory for Computer Science Technical Report 688, April 1996."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In Proc. of the 20th Annu. Symposium on the Theory of Computing, pages 1\u201310, 1988.","DOI":"10.1145\/62212.62213"},{"key":"12_CR5","unstructured":"E. Brickell, P. Gemmel and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proc. 6th Symposium on Discrete Algorithms, 1995, pp. 457\u2013466"},{"key":"12_CR6","first-page":"425","volume-title":"Lecture notes in Computer Science #1294","author":"D. Boneh","year":"1997","unstructured":"D. Boneh and M. Franklin. Efficient generation of shared RSA keys. Advances in Cryptology \u2014 CRYPTO '97 Proceedings, pp. 425\u2013439. Lecture notes in Computer Science #1294, Springer Verlag, Berlin, 1997."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"G. Brassard, D. Chaum and C. Cr\u00e9peau. Minimum Disclosure Proofs of Knowledge. In JCSS, pages 156\u2013189. 1988.","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Crepau, and I. D\u00e5mgard. Multiparty unconditionally secure protocols. In Proc. of the 20th Annu. ACM Symp. on the Theory of Computing, pages 11\u201319, 1988.","DOI":"10.1145\/62212.62214"},{"key":"12_CR9","first-page":"174","volume-title":"Lecture Notes in Computer Science #839","author":"R. Cramer","year":"1994","unstructured":"R. Cramer, I. Damg\u00e5rd and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. Advances in Cryptology \u2014 CRYPTO '94 Proceedings, pp. 174\u2013187. Lecture Notes in Computer Science #839, Berlin: Springer-Verlag, 1994."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch. Efficient and generalized group signatures. Advances in Cryptology \u2014 EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 465\u2013479. Springer Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_32"},{"key":"12_CR11","first-page":"410","volume-title":"Lecture notes in Computer Science #1294","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups. Advances in Cryptology \u2014 CRYPTO '97 Proceedings, pp. 410\u2013424. Lecture notes in Computer Science #1294, Springer Verlag, Berlin, 1997."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"D. Chaum and E. van Heyst. Group signatures. Advances in Cryptology \u2014 EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257\u2013265. SpringerVerlag, 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"L. Chen and T. P. Pedersen. New group signature schemes. Advances in Cryptology \u2014 EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 171\u2013181. SpringerVerlag, 1995.","DOI":"10.1007\/BFb0053433"},{"key":"12_CR14","first-page":"250","volume-title":"Lecture Notes in Computer Science #773","author":"I. D\u00e5mgard","year":"1994","unstructured":"I. D\u00e5mgard, T. Pedersen and B. Pfitzmann. On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. Advances in Cryptology \u2014 CRYPTO '93 Proceedings, pp. 250\u2013265. Lecture Notes in Computer Science #773, Berlin: Springer-Verlag, 1994."},{"key":"12_CR15","first-page":"307","volume-title":"Theshold cryptosystems","author":"Y. Desmedt","year":"1990","unstructured":"Yvo Desmedt and Yair Frankel. Theshold cryptosystems. Advances in Cryptology \u2014 CRYPTO '89 Proceedings, pp. 307\u2013315. Berlin: Springer-Verlag, 1990."},{"key":"12_CR16","first-page":"10","volume-title":"A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Advances in Cryptology \u2014 CRYPTO '89 Proceedings, pp. 10\u201318. Berlin: Springer-Verlag, 1985."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis and M. Yung. \u201cIndirect Discourse Proofs\u201d: Achieving Efficient Fair Off-Line E-Cash. Advances in Cryptology-ASIACRYPT '96 proceedings, pp. 286\u2013300. Lecture Notes in Computer Science #1163. Springer-Verlag, 19851996.","DOI":"10.1007\/BFb0034855"},{"key":"12_CR18","volume-title":"Escrow Encryption Systems Visited: Attacks, Analysis and Designs","author":"Y. Frankel","year":"1995","unstructured":"Y. Frankel and M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Advances in Cryptology \u2014 CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995."},{"issue":"2","key":"12_CR19","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic Encryption. In JCSS Vol 28(2), pages 270\u2013299, 1984.","journal-title":"JCSS"},{"key":"12_CR20","unstructured":"J. Kilian and E. Petrank. Identity Escrow. Theory of Cryptography Library, ftp:\/\/theory.lcs.mit.edu\/pub\/tcryptol\/97-11.p8, August 1997."},{"key":"12_CR21","volume-title":"Fair Cryptosystems, Revisited","author":"J. Kilian","year":"1995","unstructured":"J. Kilian and F. T. Leighton. Fair Cryptosystems, Revisited. Advances in Cryptology \u2014 CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995."},{"key":"12_CR22","unstructured":"F. T. Leighton. Failsafe key escrow systems. Technical Memo 483, MIT Lab. for Computer Science, August 1994."},{"key":"12_CR23","volume-title":"A Key Escrow System with Warrant Bounds","author":"A. Lenstra","year":"1995","unstructured":"A. Lenstra, P. Winkler and Y. Yacobi. A Key Escrow System with Warrant Bounds. Advances in Cryptology \u2014 CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995."},{"key":"12_CR24","volume-title":"Fair public-key cryptosystems","author":"S. Micali","year":"1993","unstructured":"S. Micali Fair public-key cryptosystems. Advances in Cryptology \u2014 CRYPTO '92 Proceedings, Berlin: Springer-Verlag, 1993."},{"key":"12_CR25","unstructured":"S. Micali. Fair public-key cryptosystems. Technical Report 579, MIT Lab. for Computer Science, September 1993."},{"key":"12_CR26","unstructured":"S. Micali. Certified E-Mail With Invisible Post Offices. Talk at Workshop on Secure Computation, Weizmann Institute, June, 1998."},{"key":"12_CR27","volume-title":"A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems","author":"S. Micali","year":"1995","unstructured":"S. Micali and R. Sydney. A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems. Advances in Cryptology \u2014 CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995."},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"H. Petersen. How to convert any digital signature scheme into a group signature scheme. Security Protocols Workshop, Paris, 1997.","DOI":"10.1007\/BFb0028168"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymityrevoking trustees. In proceedings, ESORICS: European Symposium on Research in Computer Security\u201d, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61770-1_26"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"A. De Santis, Y. Desmedt, Y. Frankel and M. Yung. How to Share a Function Securely (Extended Summary). Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 522\u2013533, Montr\u00e9al, Qu\u00e9bec, May 23\u201325, 1994.","DOI":"10.1145\/195058.195405"},{"key":"12_CR31","unstructured":"Schneier, B. (1993). Applied Cryptography. John Wiley."},{"key":"12_CR32","first-page":"209","volume":"921","author":"M. Stadler","year":"1995","unstructured":"M. Stadler, J.-M. Piveteau and J. Camenisch Fair blind signatures. In Proc. Eurocrypt 95, 1995, LNCS 921, pp. 209\u2013219","journal-title":"LNCS"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Adam Young and Moti Yung. Auto-Recoverable Auto-Certifiable Cryptosystems. Eurocrypt 98, LNCS 1403 (Ed. K. Nyberg), pp. 17\u201332.","DOI":"10.1007\/BFb0054114"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:18:57Z","timestamp":1558271937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/bfb0055727","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}