{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T18:55:31Z","timestamp":1648752931835},"reference-count":16,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[1995,12,1]],"date-time":"1995-12-01T00:00:00Z","timestamp":817776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1995,12]]},"DOI":"10.1016\/0140-3664(96)81600-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:56:11Z","timestamp":1027637771000},"page":"993-996","source":"Crossref","is-referenced-by-count":3,"title":["ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer"],"prefix":"10.1016","volume":"18","author":[{"given":"Yung-Hsiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(96)81600-8_BIB1","author":"Rabin","year":"1981"},{"key":"10.1016\/0140-3664(96)81600-8_BIB2","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/3812.3818","article-title":"Randomized protocol for signing contracts","volume":"Vol 28","author":"Even","year":"1985","journal-title":"Comm. ACM"},{"key":"10.1016\/0140-3664(96)81600-8_BIB3","first-page":"350","article-title":"Equivalence between two flavors of oblivious transfer","author":"Cr\u00e9peau","year":"1987","journal-title":"Crypto '87"},{"issue":"No 10","key":"10.1016\/0140-3664(96)81600-8_BIB4","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1049\/el:19900416","article-title":"Noninteractive oblivious transfer","volume":"Vol 26","author":"Harn","year":"1990","journal-title":"Electr. Lett."},{"key":"10.1016\/0140-3664(96)81600-8_BIB5","first-page":"312","article-title":"An oblivious transfer protocol and its application for the exchange of secrets","author":"Harn","year":"1991","journal-title":"Asiacrypt '91"},{"key":"10.1016\/0140-3664(96)81600-8_BIB6","first-page":"46","article-title":"Public-randomness in public-key cryptography","author":"Santis","year":"1990","journal-title":"Eurocrypto '90"},{"key":"10.1016\/0140-3664(96)81600-8_BIB7","first-page":"547","article-title":"Non-interactive oblivious transfer and applications","author":"Bellare","year":"1989","journal-title":"Crypto '89"},{"key":"10.1016\/0140-3664(96)81600-8_BIB8","first-page":"31","article-title":"Oblivious transfer protecting secrecy","author":"den Boer","year":"1990","journal-title":"Eurocrypto '90"},{"key":"10.1016\/0140-3664(96)81600-8_BIB9","first-page":"257","article-title":"How to break a \u201csecure\u201d oblivious transfer protocol","author":"Beaver","year":"1992","journal-title":"Eurocrypto 92"},{"issue":"No 2","key":"10.1016\/0140-3664(96)81600-8_BIB10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","article-title":"Zero knowledge proofs of identity","volume":"Vol 1","author":"Feige","year":"1988","journal-title":"J. Cryptology"},{"issue":"No 6","key":"10.1016\/0140-3664(96)81600-8_BIB11","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"Vol 22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. In for. Theory"},{"key":"10.1016\/0140-3664(96)81600-8_BIB12","article-title":"On the zero knowledge proof systems based on one-out-of-two non-interactive oblivious transfers","author":"Chen","year":"1994"},{"key":"10.1016\/0140-3664(96)81600-8_BIB13","first-page":"498","article-title":"Noninteractive public key cryptography","volume":"Vol 547","author":"Maurer","year":"1991","journal-title":"Eurocrypto '91"},{"key":"10.1016\/0140-3664(96)81600-8_BIB14","first-page":"458","article-title":"A remark on a non-interactive public key distribution system","author":"Maurer","year":"1992","journal-title":"Eurocrypto '92"},{"issue":"No 10","key":"10.1016\/0140-3664(96)81600-8_BIB15","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1049\/el:19900436","article-title":"ID based public key cryptosystems based on Okamoto and Tanaka's ID based one way communications scheme","volume":"Vol 26","author":"Tsai","year":"1990","journal-title":"Electr. Lett."},{"issue":"No 2","key":"10.1016\/0140-3664(96)81600-8_BIB16","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signature and public-key cryptosystems","volume":"Vol 21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366496816008?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366496816008?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T23:22:34Z","timestamp":1555197754000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366496816008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,12]]},"references-count":16,"journal-issue":{"issue":"12","published-print":{"date-parts":[[1995,12]]}},"alternative-id":["0140366496816008"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(96)81600-8","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1995,12]]}}}