{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:07Z","timestamp":1761401287933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128860","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"289-296","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Addressing the shortcomings of one-way chains"],"prefix":"10.1145","author":[{"given":"Roberto Di","family":"Pietro","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma - La Sapienza, Via Salaria, Roma, Italy"}]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma - La Sapienza, Via Salaria, Roma, Italy"}]},{"given":"Antonio","family":"Durante","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma - La Sapienza, Via Salaria, Roma, Italy"}]},{"given":"Vishwas","family":"Patil","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma - La Sapienza, Via Salaria, Roma, Italy"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716986"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_10"},{"key":"e_1_3_2_1_3_1","volume-title":"8th International Conference, Springer--Verlag, LNCS(3110)","author":"Ateniese G.","year":"2004","unstructured":"G. Ateniese and B. de Medeiros . Identity-based chameleon hash and applications. FC: Financial Cryptography , 8th International Conference, Springer--Verlag, LNCS(3110) :164--180, 2004 .]] G. Ateniese and B. de Medeiros. Identity-based chameleon hash and applications. FC: Financial Cryptography, 8th International Conference, Springer--Verlag, LNCS(3110):164--180, 2004.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"4th International Conference, Springer--Verlag, LNCS(3352)","author":"Ateniese G.","year":"2004","unstructured":"G. Ateniese and B. de Medeiros . On the key exposure problem in chameleon hashes. SCN: Security in Communication Networks , 4th International Conference, Springer--Verlag, LNCS(3352) :165--179, 2004 .]] G. Ateniese and B. de Medeiros. On the key exposure problem in chameleon hashes. SCN: Security in Communication Networks, 4th International Conference, Springer--Verlag, LNCS(3352):165--179, 2004.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.29"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"63","article-title":"A discrete logarithm implementation of perfect zero-knowledge blobs. Journal of Cryptology","volume":"2","author":"Boyar J. F.","year":"1990","unstructured":"J. F. Boyar and S. A. Kurtz . A discrete logarithm implementation of perfect zero-knowledge blobs. Journal of Cryptology , Springer--Verlag , 2 ( 2 ): 63 -- 76 , 1990 .]] J. F. Boyar and S. A. Kurtz. A discrete logarithm implementation of perfect zero-knowledge blobs. Journal of Cryptology, Springer--Verlag, 2(2):63--76, 1990.]]","journal-title":"Springer--Verlag"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"e_1_3_2_1_9_1","volume-title":"7th International Conference, Springer--Verlag, LNCS(3225)","author":"Chen X.","year":"2004","unstructured":"X. Chen , F. Zhang , and K. Kim . Chameleon hashing without key exposure. ISC: Information Security , 7th International Conference, Springer--Verlag, LNCS(3225) :87--98, 2004 .]] X. Chen, F. Zhang, and K. Kim. Chameleon hashing without key exposure. ISC: Information Security, 7th International Conference, Springer--Verlag, LNCS(3225):87--98, 2004.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238073"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903897"},{"key":"e_1_3_2_1_12_1","volume-title":"Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption","author":"Ford W.","year":"2002","unstructured":"W. Ford and M. S. Baum . Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2 nd Ed. Prentice Hall , 2002 .]] W. Ford and M. S. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, 2nd Ed. Prentice Hall, 2002.]]","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_14_1","first-page":"151","volume-title":"NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security","author":"Haller N. M.","year":"1994","unstructured":"N. M. Haller . The S\/KEY one-time password system . NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security , pages 151 -- 157 , 1994 .]] N. M. Haller. The S\/KEY one-time password system. NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 151--157, 1994.]]"},{"key":"e_1_3_2_1_15_1","first-page":"143","volume-title":"NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security","author":"Krawczyk H.","year":"2000","unstructured":"H. Krawczyk and T. Rabin . Chameleon hashing and signatures . NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security , pages 143 -- 154 , 2000 .]] H. Krawczyk and T. Rabin. Chameleon hashing and signatures. NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 143--154, 2000.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security","author":"Pannetrat A.","year":"2003","unstructured":"A. Pannetrat and R. Molva . Efficient multicast packet authentication . NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security , 2003 .]] A. Pannetrat and R. Molva. Efficient multicast packet authentication. NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security, 2003.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830522"},{"key":"e_1_3_2_1_19_1","volume-title":"NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , R. Canetti , D. X. Song , and J. D. Tygar . Efficient and secure source authentication for multicast . NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security , 2001 .]] A. Perrig, R. Canetti, D. X. Song, and J. D. Tygar. Efficient and secure source authentication for multicast. NDSS: Proceedings of the ISOC Symposium on Network and Distributed System Security, 2001.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884425"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704142"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383062"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":23,"alternative-id":["10.1145\/1128817.1128860","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128860","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}