{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:25:49Z","timestamp":1753921549554,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_32","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"385-399","source":"Crossref","is-referenced-by-count":31,"title":["An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Sakurai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shingo","family":"Miyazaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"32_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-38424-3_14","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"J. Boyar","year":"1991","unstructured":"Boyar, J., Chaum, D., Damgard, I.: Convertible undeniable signatures. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 189\u2013205. Springer, Heidelberg (1991)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proc. STOC 1994, pp. 544\u2013553 (1994)","DOI":"10.1145\/195058.195407"},{"issue":"2","key":"32_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of ACM"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"D. Chaum","year":"1991","unstructured":"Chaum, D.: Zero-knowledge undeniable signatures. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 458\u2013464. Springer, Heidelberg (1991)"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 212\u2013216. Springer, Heidelberg (1990)"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/3-540-68339-9_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"R. Cramer","year":"1996","unstructured":"Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 72\u201383. Springer, Heidelberg (1996)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/3-540-48405-1_27","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Camenisch","year":"1999","unstructured":"Camenisch, J., Michels, M.: Separability and efficiency for generic group signature schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 413. Springer, Heidelberg (1999)"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-68339-9_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"I. Damgard","year":"1996","unstructured":"Damgard, I.: New convertible undeniable signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 372\u2013386. Springer, Heidelberg (1996), ebay. eBay Incorporation, http:\/\/pages.ebay.com\/"},{"key":"32_CR10","unstructured":"FIPS 180-1, Secure hash standard, Federal Information Processing Stan- dards Publication 180, U.S. Department of Commerce\/N.I.S.T., National Technical Information Service (1993)"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/3-540-49264-X_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"M.K. Franklin","year":"1995","unstructured":"Franklin, M.K., Reiter, M.K.: Verifiable signature sharing. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 50\u201363. Springer, Heidelberg (1995)"},{"issue":"5","key":"32_CR12","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. IEEE Transactions on Software Engineering\u00a022(5), 302\u2013312 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/BFb0052232","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based undeniable signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 132\u2013149. Springer, Heidelberg (1997)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. JCSS, 28 (1984)","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"32_CR15","unstructured":"Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Third USENIX Workshop on Electronic Commerce Proceedings, pp. 61\u201374 (1998)"},{"key":"32_CR16","unstructured":"Inoue, S., Matsumoto, T.: A note on anonymous electronic auction, Technical Report of IEICE, ISEC95-5 (1995) (in Japanese)"},{"key":"32_CR17","unstructured":"Imamura, Y., Matsumoto, T., Imai, H.: Electronic anonymous bidding schemes. In: The 1994 Symposium on Cryptography and Information Security, SCIS94-11B (1994) (in Japanese)"},{"key":"32_CR18","unstructured":"Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round anonymous auction protocols. In: Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62\u201369 (1998)"},{"key":"32_CR19","unstructured":"Kikuchi, H., Nakanishi, S.: Registration-free protocol for anonymous auction. In: Proceedings of Computer Security Symposium 1998, pp. 243\u2013248 (1998) (in Japanese)"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034829","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"S.J. Kim","year":"1996","unstructured":"Kim, S.J., Park, S.J., Won, D.H.: Convertible group signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, Springer, Heidelberg (1996)"},{"issue":"1","key":"32_CR22","first-page":"20","volume":"E81-A","author":"M. Kudo","year":"1998","unstructured":"Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals\u00a0E81-A(1), 20\u201327 (1998)","journal-title":"IEICE Trans. Fundamentals"},{"key":"32_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Michels, M., Petersen, H., Horster, P.: Breaking and repairing a convertible undeniable signature scheme. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 148\u2013152 (1996)","DOI":"10.1145\/238168.238207"},{"key":"32_CR25","unstructured":"Michels, M., Stadler, M.: Efficient convertible undeniable signature schemes. In: Proc. 4th Annual Workshop on Selected Areas in Cryptography (1997), http:\/\/www.geocities.com\/CapeCanaveral\/Lab\/8983\/publications.htm"},{"key":"32_CR26","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"32_CR27","unstructured":"Nakanishi, T., Watanabe, H., Fujiwara, T., Kasami, T.: An anonymous bidding protocol using undeniable signature. In: The 1995 Symposium on Cryptography and Information Security, SCIS95-B1.4 (1995) (in Japanese)"},{"key":"32_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"Niemi","year":"1995","unstructured":"Niemi, Renvall: How to prevent buying of votes in computer elections. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, Springer, Heidelberg (1995)"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Receipt-free elections voting schemes for large scale elections. In: Proc. Security Protocol 1997 (1997)","DOI":"10.1007\/BFb0028157"},{"key":"32_CR30","series-title":"Lecture Notes in Computer Science","first-page":"178","volume-title":"Security Protocols","author":"H. Petersen","year":"1998","unstructured":"Petersen, H.: How to convert any digital signature scheme into a group signature scheme. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 178\u2013190. Springer, Heidelberg (1998)"},{"key":"32_CR31","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds:anonymity for web transactions. The ACM Transactions on Information and System Security\u00a01(1) (November 1998)","DOI":"10.1145\/290163.290168"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm, Internet Request for Comments 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 422\u2013432. Springer, Heidelberg (2000); a previous version is Universally verifiable auction protocol which hides losing bids. In: Proceedings of the 1999 Symposium on Cryptography and Information Security, pp. 35\u201339 (1999) (in Japanese)","DOI":"10.1007\/978-3-540-46588-1_28"},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"Sako, Kilian: Receipt-Free Mix-type voting scheme. In: Proc. Eurocrypt 1995 (1995)","DOI":"10.1007\/3-540-49264-X_32"},{"key":"32_CR35","unstructured":"Seo, K., Kikuchi, H., Fujioka, A., Nakanishi, S.: Evaluation of anonymous channel in the internet. In: The 1998 Symposium on Cryptography and Information Security, SCIS98-3.3.E (1998) (in Japanese)"},{"key":"32_CR36","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and Onion routing. In: IEEE Symposium on Security and Privacy, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"32_CR37","unstructured":"Sakurai, K., Miyazaki, S.: A bulletin-board based digital auction scheme with bidding down strategy. In: Blum, M., Lee Edi, C.H. (eds.) Proc. of 1999 International Workshop on Cryptographic Techniques and E-Commerce, pp. 180\u2013187 (1999)"},{"key":"32_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-48390-X_17","volume-title":"Financial Cryptography","author":"S.G. Stubblebine","year":"1999","unstructured":"Stubblebine, S.G., Syverson, P.F.: Fair on-line auctions without special trusted parties. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, p. 230. Springer, Heidelberg (1999)"},{"key":"32_CR39","unstructured":"Auctions of YAHOO, http:\/\/auctions.yahoo.com\/"},{"key":"32_CR40","unstructured":"Yamamura, S.: A bidding protocol on a network. In: The Proceedings of the 1988 Workshop on Cryptography and Information Security, pp. 41\u201350 (1988) (in Japanese)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T19:01:56Z","timestamp":1736708516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/10718964_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}