{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:20Z","timestamp":1764996860993},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,6,23]],"date-time":"2009-06-23T00:00:00Z","timestamp":1245715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s10207-009-0087-0","type":"journal-article","created":{"date-parts":[[2009,6,22]],"date-time":"2009-06-22T06:10:49Z","timestamp":1245651049000},"page":"347-355","source":"Crossref","is-referenced-by-count":7,"title":["On the pseudo-freeness and the CDH assumption"],"prefix":"10.1007","volume":"8","author":[{"given":"Shingo","family":"Hasegawa","sequence":"first","affiliation":[]},{"given":"Shuji","family":"Isobe","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Shizuya","sequence":"additional","affiliation":[]},{"given":"Katsuhiro","family":"Tashiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,23]]},"reference":[{"key":"87_CR1","volume-title":"Introduction to Analytic Number Theory","author":"T.M. Apostol","year":"1976","unstructured":"Apostol T.M.: Introduction to Analytic Number Theory. Springer, New York (1976)"},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Baric, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. Eurocrypto \u201997, 480\u2013494 (1997)","DOI":"10.1007\/3-540-69053-0_33"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Crypto \u201998, 13\u201325 (1998)","DOI":"10.1007\/BFb0055717"},{"key":"87_CR4","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. In: Proceedings of 6th ACM Conference on Computer and Communications Security, 46\u201352 (1999)","DOI":"10.1145\/319709.319716"},{"issue":"6","key":"87_CR5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. Crypto \u201997, 16\u201330 (1997)","DOI":"10.1007\/BFb0052225"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Guti\u00e9rrez, C.: Satisfiability of equations in free groups is in PSPACE. STOC 2000, 21\u201327 (2000)","DOI":"10.1145\/335305.335308"},{"key":"87_CR8","unstructured":"Hohenberger, S.: The cryptographic impact of groups with infeasible inversion. Master\u2019s thesis, EECS Dept., MIT (2003)"},{"key":"87_CR9","unstructured":"Hirano, T., Tanaka, K.: Variations on pseudo-free groups. Research Reports, Series C: Computer Science, C-239, Tokyo Institute of Technology (2007)"},{"key":"87_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1002\/cpa.3160240103","volume":"XXIV","author":"S. Lipschutz","year":"1971","unstructured":"Lipschutz S., Miller C.F.: Groups with certain solvable and unsolvable decision problems. Commun. Pure Appl. Math. XXIV, 7\u201315 (1971)","journal-title":"Commun. Pure Appl. Math."},{"key":"87_CR11","unstructured":"Makanin, G.S.: Equations in a free group. Izvestiya NA SSSR 46, 1199\u20131273 (1982) [English translation: Math. USSR-Izv, 21, 546\u2013582 (1983)]"},{"key":"87_CR12","first-page":"257","volume":"50","author":"A.L. Mal\u2019cev","year":"1960","unstructured":"Mal\u2019cev A.L.: On some correspondence between rings and groups. Math. Sbornik 50, 257\u2013260 (1960)","journal-title":"Math. Sbornik"},{"key":"87_CR13","unstructured":"Micciancio, D.: The RSA group is pseudo-free. Eurocrypt 2005. LNCS 3494, 387\u2013403 (2005)"},{"key":"87_CR14","unstructured":"Rivest R.L.: On the notion of pseudo-free groups. TCC 2004. LNCS 2951, 505\u2013521 (2004)"},{"issue":"2","key":"87_CR15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signature and public-key cryptosystems. Commun ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun ACM"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0087-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0087-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0087-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:24Z","timestamp":1559127684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0087-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,23]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["87"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0087-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,23]]}}}