\begin{thebibliography}{BDPW89}

\bibitem[BD90]{BethD1990}
Thomas Beth and Yvo Desmedt.
\newblock Identification tokens---or: Solving the chess grandmaster problem.
\newblock In A.~J. Menezes and S.~A. Vanstone, editors, {\em Advances in
  Cryptology---CRYPTO~'90}, volume 537 of {\em Lecture Notes in Computer
  Science}, pages 169--176. Springer-Verlag, 1991, 11--15~August 1990.

\bibitem[BDPW89]{BurmesterDPW1989}
Mike V.~D. Burmester, Yvo Desmedt, Fred Piper, and Michael Walker.
\newblock A general zero-knowledge scheme.
\newblock In J.-J. Quisquater and J.~Vandewalle, editors, {\em Advances in
  Cryptology---EUROCRYPT~89}, volume 434 of {\em Lecture Notes in Computer
  Science}, pages 122--133. Springer-Verlag, 1990, 10--13~April 1989.

\bibitem[CT89]{ChickT1989}
Gerald~C. Chick and Stafford~E. Tavares.
\newblock Flexible access control with master keys.
\newblock In G.~Brassard, editor, {\em Advances in Cryptology---CRYPTO~'89},
  volume 435 of {\em Lecture Notes in Computer Science}, pages 316--322.
  Springer-Verlag, 1990, 20--24~August 1989.

\bibitem[Dam90]{EUROCRYPT90}
I.~B. Damg{\aa}rd, editor.
\newblock {\em Advances in Cryptology---EUROCRYPT~90}, volume 473 of {\em
  Lecture Notes in Computer Science}. Springer-Verlag, 1991, 21--24~May 1990.

\bibitem[DGB87]{DesmedtGB1987}
Yvo Desmedt, Claude Goutier, and Samy Bengio.
\newblock Special uses and abuses of the {Fiat-Shamir} passport protocol
  (extended abstract).
\newblock In Carl Pomerance, editor, {\em Advances in Cryptology---CRYPTO~'87},
  volume 293 of {\em Lecture Notes in Computer Science}, pages 21--39.
  Springer-Verlag, 1988, 16--20~August 1987.

\bibitem[FS86]{FiatS1986}
Amos Fiat and Adi Shamir.
\newblock How to prove yourself: Practical solutions to identification and
  signature problems.
\newblock In A.~M. Odlyzko, editor, {\em Advances in Cryptology---CRYPTO~'86},
  volume 263 of {\em Lecture Notes in Computer Science}, pages 186--194.
  Springer-Verlag, 1987, 11--15~August 1986.

\bibitem[Gol88]{CRYPTO88}
S.~Goldwasser, editor.
\newblock {\em Advances in Cryptology---CRYPTO~'88}, volume 403 of {\em Lecture
  Notes in Computer Science}. Springer-Verlag, 1990, 21--25~August 1988.

\bibitem[GPR97]{GPR1997}
Oded Goldreich, Birgit Pfitzmann, and Ronald~L. Rivest.
\newblock Self-delegation with controlled propagation --- or --- what if you
  lose your laptop.
\newblock {\em Theory of Cryptography Library}, September 1997.

\bibitem[GQ88]{GuillouQ1988}
Louis~C. Guillou and Jean-Jacques Quisquater.
\newblock A practical zero-knowledge protocol fitted to security microprocessor
  minimizing both transmission and memory.
\newblock In Christoph~G. G{\"u}nther, editor, {\em Advances in
  Cryptology---EUROCRYPT~88}, volume 330 of {\em Lecture Notes in Computer
  Science}, pages 123--128. Springer-Verlag, 25--27~May 1988.

\bibitem[MS88]{MicaliS1988:244}
Silvio Micali and Adi Shamir.
\newblock An improvement of the {Fiat-Shamir} identification and signature
  scheme.
\newblock In Goldwasser \cite{CRYPTO88}, pages 244--247.

\bibitem[Nac92]{Naccache1992}
David Naccache.
\newblock A {Montgomery}-suitable {Fiat-Shamir}-like authentication scheme.
\newblock In R.~A. Rueppel, editor, {\em Advances in
  Cryptology---EUROCRYPT~92}, volume 658 of {\em Lecture Notes in Computer
  Science}, pages 488--491. Springer-Verlag, 24--28~May 1992.

\bibitem[Oka92]{Okamoto1992}
Tatsuaki Okamoto.
\newblock Provably secure and practical identification schemes and
  corresponding signature schemes.
\newblock In Ernest~F. Brickell, editor, {\em Advances in
  Cryptology---CRYPTO~'92}, volume 740 of {\em Lecture Notes in Computer
  Science}, pages 31--53. Springer-Verlag, 1993, 16--20~August 1992.

\bibitem[OO88]{OhtaO1988}
Kazuo Ohta and Tatsuaki Okamoto.
\newblock A modification of the {Fiat-Shamir} scheme.
\newblock In Goldwasser \cite{CRYPTO88}, pages 232--243.

\bibitem[OOK90]{OhtaOK1990}
Kazuo Ohta, Tatsuaki Okamoto, and Kenji Koyama.
\newblock Membership authentication for hierarchical multigroups using the
  extended {Fiat-Shamir} scheme.
\newblock In Damg{\aa}rd \cite{EUROCRYPT90}, pages 446--457.

\bibitem[OS90]{OngS1990}
H.~Ong and C.~P. Schnorr.
\newblock Fast signature generation with a {Fiat Shamir}--like scheme.
\newblock In Damg{\aa}rd \cite{EUROCRYPT90}, pages 432--440.

\bibitem[Riv98]{RivestCRL1998}
Ronald~L. Rivest.
\newblock Can we eliminate certificate revocation lists?
\newblock In Rafael Hirschfeld, editor, {\em Financial Cryptography~'98},
  volume 1465 of {\em Lecture Notes in Computer Science}, pages 178--183.
  Springer-Verlag, February 1998.

\end{thebibliography}
