{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:18Z","timestamp":1725475818379},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673804"},{"type":"electronic","value":"9783540455684"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_11","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T15:38:40Z","timestamp":1167493120000},"page":"132-146","source":"Crossref","is-referenced-by-count":1,"title":["Secure Selection Protocols"],"prefix":"10.1007","author":[{"given":"Kapali","family":"Viswanathan","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital sigantures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 236\u2013250. Springer, Heidelberg (1998)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"11_CR4","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. Technical Report CS-R9413, Computer Science\/Department of Algorithmics and Architecture, P.O. Box 94079, 1090 GB Amsterdam, The Netherlands (1994)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Society and group oriented crytpography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 120\u2013127. Springer, Heidelberg (1988)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology -CRYPTO 1986","author":"A. Fiat","year":"1986","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) Advances in Cryptology -CRYPTO 1986. LNCS, pp. 186\u2013194. Springer, Heidelberg (1986)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/3-540-44750-4_18","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"Y. Frankel","year":"1995","unstructured":"Frankel, Y., Yung, M.: Escrow encryption systems visited: Attacks, analysis and designs. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 222\u2013235. Springer, Heidelberg (1995)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Frankel, Y., Tsiounis, Y., Yung, M.: Indirect discourse proofs: Achieving efficient fair off-line e-cash. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163. Springer, Heidelberg (1996)","DOI":"10.1007\/BFb0034855"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-49649-1_21","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"Y. Frankel","year":"1998","unstructured":"Frankel, Y., Tsiounis, Y., Yung, M.: Fair off-line e-cash made easy. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 257\u2013270. Springer, Heidelberg (1998)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/BFb0000432","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"V. Niemi","year":"1995","unstructured":"Niemi, V., Renvall, A.: How to prevent buying of votes in computer elections. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 164\u2013170. Springer, Heidelberg (1995)"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/0167-4048(91)90081-N","volume":"10","author":"H. Nurmi","year":"1991","unstructured":"Nurmi, H., Salomaa, A., Santean, L.: Secret ballot elections in computer networks. Computers & Security\u00a010, 553\u2013560 (1991)","journal-title":"Computers & Security"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Security Protocol Workshop (1997)","DOI":"10.1007\/BFb0028157"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/BFb0028503","volume-title":"Information and Communications Security","author":"H. Petersen","year":"1997","unstructured":"Petersen, H., Poupard, G.: Efficient scalable fair cash with offline extortion prevention. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 463\u2013473. Springer, Heidelberg (1997)"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology\u00a04, 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"issue":"7","key":"11_CR15","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/12.392857","volume":"44","author":"S. Yen","year":"1995","unstructured":"Yen, S., Laih, C.: Improved digital signature suitable for batch verification. IEEE Transactions on Computers\u00a044(7), 957\u2013959 (1995)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:58:43Z","timestamp":1556006323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/10719994_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}