iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/3-540-57220-1_57
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:06:52Z","timestamp":1725664012512},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540572206"},{"type":"electronic","value":"9783540479765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57220-1_57","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:20:45Z","timestamp":1330258845000},"page":"133-142","source":"Crossref","is-referenced-by-count":15,"title":["Group-oriented undeniable signature schemes without the assistance of a mutually trusted party"],"prefix":"10.1007","author":[{"given":"Lein","family":"Harn","sequence":"first","affiliation":[]},{"given":"Shoubao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Y. Desmedt.: Society and group-oriented cryptography: a new concept. Advances in Cryptology, Proc. of Crypto '87, pp. 120\u2013127, August 16\u201320,1988.","DOI":"10.1007\/3-540-48184-2_8"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Y. Frankel.: A practical protocol for large group-oriented networks. In Advances in Cryptology, Proc. of Eurocrypt '89, pp. 56\u201362, April 10\u201313,1989.","DOI":"10.1007\/3-540-46885-4_8"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and Y. Frankel.: Threshold cryptosystem. In Advances in Cryptology, Proc. of Crypto '89, pp. 307\u2013315, August 20\u201324, 1989.","DOI":"10.1007\/0-387-34805-0_28"},{"key":"11_CR4","unstructured":"Y. Desmedt and Y. Frankel.: Shared generation of authenticators. In Advances in Cryptology, Proc. of Crypto '91, August 11\u201315, 1991."},{"issue":"No.2","key":"11_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adelman.: A method for obtaining digital signatures and public-key cryptosystem. In Commun, of ACM, Vol. 21, No.2, pp. 120\u2013126, Feb. 1978.","journal-title":"Commun, of ACM"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"I. Ingemarsson, and G. J. Simmons.: A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In Advances in Cryptology, Proc. of Eurocrypt '90, May 21\u201324, 1990.","DOI":"10.1007\/3-540-46877-3_24"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum and H. van Antwerpen.: Undeniable signature. In Advances in Cryptology, Proc. of Crypto '89, pp. 212\u2013216, August 20\u201324, 1989.","DOI":"10.1007\/0-387-34805-0_20"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum.: Zero-knowledge undeniable signatures. In Advances in Cryptology, Proc. of Eurocrypt '90, May 21\u201324, 1990.","DOI":"10.1007\/3-540-46877-3_41"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"D. Chaum and E. van Heyst.: Group signature. In Advances in Cryptology, Proc. of Eurocrypt '91, pp. 257\u2013265, April 8\u201311, 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"11_CR10","unstructured":"L. Harn and S. Yang.: Group-oriented (n, n) digital signature schemes without the assistance of a mutually trusted party. Submitted to The Journal of Computer Security."},{"key":"11_CR11","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig, and M. Hellman.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. In IEEE Trans. Inform. Theory, Vol. IT-24, pp. 106\u2013110, 1978.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57220-1_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T05:18:38Z","timestamp":1640927918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57220-1_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540572206","9783540479765"],"references-count":11,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-57220-1_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}