{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:03:30Z","timestamp":1772240610915,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":30,"publisher":"Springer US","isbn-type":[{"value":"9781402081460","type":"print"},{"value":"9781402081477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_18","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T16:57:38Z","timestamp":1140454658000},"page":"271-286","source":"Crossref","is-referenced-by-count":38,"title":["Accountable Ring Signatures: A Smart Card Approach"],"prefix":"10.1007","author":[{"given":"Shouhuai","family":"Xu","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. Asiacrypt\u201902."},{"key":"18_CR2","unstructured":"R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. Security Protocol\u201997."},{"key":"18_CR3","unstructured":"G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Crypto\u201900."},{"key":"18_CR4","unstructured":"M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. Eurocrypt\u201900."},{"key":"18_CR5","unstructured":"M. Bellare and P. Rogaway. Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. ACM CCS\u201993."},{"key":"18_CR6","unstructured":"D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys (Extended Abstract). Crypto\u201997."},{"key":"18_CR7","unstructured":"E. Bresson, J. Stern, and M. Szydlo. Threshold Ring Signatures and Applications to Ad-Hoc Groups. Crypto\u201902."},{"key":"18_CR8","unstructured":"J. Camenisch. Efficient and Generalized Group Signatures. Eurorypt\u201997."},{"key":"18_CR9","unstructured":"J. Camenisch and A. Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. Crypto\u201902."},{"key":"18_CR10","unstructured":"J. Camenisch and M. Michels. A Group Signature Scheme based on an RSA-variant. Tech. Report RS-98-27, BRICS. Preliminary version appeared at Asiacrypt\u2019 98."},{"key":"18_CR11","unstructured":"J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). Crypto\u201997."},{"key":"18_CR12","unstructured":"S. Canard and M. Girault. Implementing Group Signature Schemes with Smart Cards. Cardis\u201902."},{"key":"18_CR13","unstructured":"D. Chaum. Blind Signatures for Untraceable Payments. Crypto\u201982."},{"key":"18_CR14","unstructured":"S. Chaum and E. van Heyst. Group Signatures. Eurocrypt\u201991."},{"key":"18_CR15","unstructured":"L. Chen and T. Pedersen. New Group Signature Schemes. Eurocrypt\u201994."},{"key":"18_CR16","unstructured":"J. Coron, M. Joye, D. Naccache, and P. Paillier. Universal Padding Schemes for RSA. Crypto\u201902."},{"key":"18_CR17","unstructured":"R. Cramer, I. Damgard, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Crypto\u201994."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"A. De Santis, G. Di Crescenzo, G. Persiano, and M. Yung. On Monotone Formula Closure of SZK. FOCS\u201994. pp 454\u2013465.","DOI":"10.1109\/SFCS.1994.365745"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Y. Desmedt. Simmons\u2019 Protocol Is Not Free of Subliminal Channels. Computer Security Foundation Workshop\u201996.","DOI":"10.1109\/CSFW.1996.503702"},{"key":"18_CR20","unstructured":"A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto\u201986."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. J. ACM, Vol. 33, No. 4, 1986, pp 210\u2013217.","journal-title":"J. ACM"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"S. Goldwasser and S. Micali. Probabilistic Encryption. JCSS, 1984.","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, R. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen-message Attacks. SIAM J. Computing, 17(2), 1988.","DOI":"10.1137\/0217017"},{"key":"18_CR24","unstructured":"M. Naor, B. Pinkas, and O. Reingold. Distributed Pseudo-Random Functions and KDCs. Eurocrypt\u201999."},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystem. Communication of the ACM, Vol. 21, No. 2, 1978.","DOI":"10.1145\/359340.359342"},{"key":"18_CR26","unstructured":"R. Rivest, A. Shamir, and Y. Tauman. How to Leak a Secret. Asiacrypt\u201901."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. The History of Subliminal Channels. IEEE Journal on Selected Areas in Communication, vol. 16, no. 4, May 1998.","DOI":"10.1109\/49.668969"},{"key":"18_CR28","unstructured":"G. Tsudik and S. Xu. Accumulating Composites and Improved Group Signing. Asiacrypt\u201903."},{"issue":"6","key":"18_CR29","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"B. Solms von","year":"1992","unstructured":"B. von Solms and D. Naccache, On Blind Signatures and Perfect Crimes, Computers & Security, 11(6), 1992, 581\u2013583.","journal-title":"Computers & Security"},{"key":"18_CR30","unstructured":"A. Young and M. Yung. Kleptography: using Cryptography Against Cryptography. Crypto\u201997."}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T20:37:14Z","timestamp":1736282234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_18","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2004]]}}}