{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:04:40Z","timestamp":1742389480856,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icect.2004.1319743","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"273-280","source":"Crossref","is-referenced-by-count":2,"title":["A simplified approach to user controllable threshold signatures"],"prefix":"10.1109","author":[{"family":"Jong-Phil Yang","sequence":"first","affiliation":[]},{"family":"Sang Uk Shin","sequence":"additional","affiliation":[]},{"family":"Kyung-Hyune Rhee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","article-title":"Practical threshold signatures","volume":"1807","author":"shoup","year":"2000","journal-title":"Proc Eurocrypt 2000"},{"key":"15","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BFb0055722","article-title":"A simplified approach to threshold and proactive RSA","volume":"1462","author":"rabin","year":"1998","journal-title":"Advances in Cryptology-Crypto'98"},{"key":"16","first-page":"79","article-title":"Building intrusion tolerant applications","author":"wu","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"journal-title":"Two Efficient and Provably Secure Schemes for Server-assisted Threshold Signatures","year":"2003","author":"xu","key":"13"},{"key":"14","first-page":"129","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"pedersen","year":"1991","journal-title":"CRYPTO'91"},{"key":"11","article-title":"Revisiting the distributed key generation for discrete-log based cryptosystems","author":"gennaro","year":"2003","journal-title":"RSA Security'03"},{"key":"12","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1006\/inco.2000.2881","article-title":"Robust threshold DSS signatures","volume":"164","author":"gennaro","year":"2001","journal-title":"Information and Computation"},{"key":"3","first-page":"425","article-title":"Efficient generation of shared RSA keys","author":"boneh","year":"0","journal-title":"Proceedings Crypto's 97"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"journal-title":"Handbook of Applied Cryptography","year":"0","author":"menezes","key":"1"},{"key":"10","first-page":"385","article-title":"Threshold password-authenticated key exchange","volume":"2442","author":"mackenzie","year":"2002","journal-title":"LNCS"},{"key":"7","first-page":"310","article-title":"Fully distributed threshold RSA under standard assumptions","author":"fouque","year":"0","journal-title":"ASIACRYPT 2001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"5","first-page":"43","article-title":"Experimenting with shared RSA key generation","author":"malkin","year":"0","journal-title":"Proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (SNDSS)"},{"key":"4","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-0-387-35256-5_8","article-title":"Self-certified keys - Concepts and Applications","author":"petersen","year":"1997","journal-title":"Proc Communications and Multimedia Security"},{"key":"9","first-page":"137","article-title":"Two-party generation of DSA signatures","volume":"2139","author":"mackenzie","year":"2001","journal-title":"LNCS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924284"}],"event":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","start":{"date-parts":[[2004,7,9]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2004,7,9]]}},"container-title":["Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9218\/29236\/01319743.pdf?arnumber=1319743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T10:19:58Z","timestamp":1545387598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1319743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icect.2004.1319743","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}