{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:00:23Z","timestamp":1776528023095,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540673804","type":"print"},{"value":"9783540455684","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_21","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T15:38:40Z","timestamp":1167493120000},"page":"269-277","source":"Crossref","is-referenced-by-count":13,"title":["Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme"],"prefix":"10.1007","author":[{"given":"Moonseog","family":"Seo","sequence":"first","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/BFb0054014","volume-title":"Public Key Cryptography","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 55\u201359. Springer, Heidelberg (1998)"},{"key":"21_CR2","unstructured":"Electronic Funds Transfer Act (EFTA), 15 U.S.C. Sec. (1693)"},{"issue":"4","key":"21_CR3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory IT"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-49162-7_6","volume-title":"Public Key Cryptography","author":"C. Gamage","year":"1999","unstructured":"Gamage, C., Leiwo, J., Zheng, Y.: Encrypted message authentication by firewalls. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 69\u201381. Springer, Heidelberg (1999)"},{"key":"21_CR5","first-page":"140","volume-title":"Proc. of 1999 ICPP Workshops on Security(IWSEC)","author":"K. Kim","year":"1999","unstructured":"Kim, K., Park, S., Baek, J.: Improving fairness and privacy of Zhou Gollmann\u2019s fair non-repudiation protocol. In: Proc. of 1999 ICPP Workshops on Security(IWSEC), pp. 140\u2013145. IEEE Computer Society, Los Alamitos (1999)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signature for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013251. Springer, Heidelberg (1990)"},{"key":"21_CR7","unstructured":"Visa International and MasterCard International, Secure Electronic Transaction(SET) Specification book 1:Business Description (May 1997)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0034842","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"J. Zhou","year":"1996","unstructured":"Zhou, J., Gollmann, D.: Observation on non-repudiation. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 133\u2013144. Springer, Heidelberg (1996)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost(signature and encryption) <\u2009< cost(signature)+cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BFb0030430","volume-title":"Information Security","author":"Y. Zheng","year":"1998","unstructured":"Zheng, Y.: Signcryption and its application in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 291\u2013312. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T21:56:00Z","timestamp":1552859760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/10719994_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}