{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:41Z","timestamp":1725475601323},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_20","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T04:15:43Z","timestamp":1165810543000},"page":"351-367","source":"Crossref","is-referenced-by-count":7,"title":["Simple and Flexible Revocation Checking with Privacy"],"prefix":"10.1007","author":[{"given":"John","family":"Solis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"W. Aiello","year":"1998","unstructured":"Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, Springer, Heidelberg (1998)"},{"unstructured":"The\u00a0OpenPGP Alliance. Openpgp: Open pretty good privacy, http:\/\/www.openpgp.org\/","key":"20_CR2"},{"unstructured":"Berkovits, S., Chokhani, S., Furlong, J., Geiter, J., Guild, J.: Public key infrastructure study: Final report, Produced by the MITRE Corporation for NIST (April 1994)","key":"20_CR3"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"C. Cachin","year":"1999","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylog communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, Springer, Heidelberg (1999)"},{"unstructured":"Verisign Corporation. Compare all ssl certificates from verisign, inc., http:\/\/www.verisign.com\/products-services\/security-services\/ssl\/buy-ssl-certificates\/compare\/index.html","key":"20_CR5"},{"unstructured":"Verisign Corporation. Corporate overview: Fact sheet from verisign, inc., http:\/\/www.verisign.com\/verisign-inc\/corporate-overview\/fact-sheet\/index.html","key":"20_CR6"},{"unstructured":"Verisign Corporation. Public online crl repository, http:\/\/crl.verisign.com\/","key":"20_CR7"},{"unstructured":"Inc. Free Software\u00a0Foundation. Gnu privacy guard, http:\/\/www.gnupg.org\/","key":"20_CR8"},{"doi-asserted-by":"crossref","unstructured":"Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proceedings of DARPA DISCEX II (2001)","key":"20_CR9","DOI":"10.1109\/DISCEX.2001.932160"},{"unstructured":"OpenSSL\u00a0User Group. The openssl project web page, http:\/\/www.openssl.org","key":"20_CR10"},{"unstructured":"Hackerson, J.: Rethinking department of defense public key infrastructure. In: Proceedings of 23rd National Information Systems Security Conference (October 2000)","key":"20_CR11"},{"doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the internet protocol. Internet Request for Comments: RFC 2401. Network Working Group (November 1998)","key":"20_CR12","DOI":"10.17487\/rfc2401"},{"unstructured":"Kikuchi, H.: Privacy-preserving revocation check in pki. In: 2nd US-Japan Workshop on Critical Information Infrastructure Protection, July 2005, pp. 480\u2013494 (2005)","key":"20_CR13"},{"doi-asserted-by":"crossref","unstructured":"Klensin, J.: Role of the domain name system (dns). Internet Request for Comments: RFC 3467. Network Working Group (February 2003)","key":"20_CR14","DOI":"10.17487\/rfc3467"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"Financial Cryptography","author":"P. Kocher","year":"1998","unstructured":"Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 172\u2013177. Springer, Heidelberg (1998)"},{"unstructured":"Kushilevitz, E., Ostrovsky, R.: Computationally private information retrieval with polylog communication. In: Proceedings of IEEE Symposium on Foundation of Computer Science, pp. 364\u2013373 (1997)","key":"20_CR16"},{"unstructured":"US\u00a0Army\u00a0Research Laboratory. Using the cac with pki - faqs, http:\/\/www.usaarl.army.mil\/CBT\/EndUser\/chapter_06b\/chapter06b.html","key":"20_CR17"},{"unstructured":"Lenstra, A., Wang, X., de\u00a0Weger, B.: Colliding x.509 certificates. Cryptology ePrint Archive, Report 2005\/067 (2005), http:\/\/eprint.iacr.org\/","key":"20_CR18"},{"unstructured":"Merkle, R.: Secrecy, Authentication, and Public-Key Systems. PhD thesis, Stanford University, PH.D Dissertation, Department of Electrical Engineering (1979)","key":"20_CR19"},{"unstructured":"Micali, S.: Certificate revocation system. United States Patent 5666416 (September 1997)","key":"20_CR20"},{"doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: Internet public key infrastructure online certificate status protocol - OCSP. Internet Request for Comments: RFC 2560. Network Working Group (1999)","key":"20_CR21","DOI":"10.17487\/rfc2560"},{"issue":"4","key":"20_CR22","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/49.839932","volume":"18","author":"M. Naor","year":"2000","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. IEEE Journal on Selected Areas in Communications (JSAC)\u00a018(4), 561\u2013570 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"unstructured":"National\u00a0Institute of\u00a0Standards and Technology. Federal information processing standards (fips), publication 180-2, secure hash standard (shs) (February 2004)","key":"20_CR23"},{"unstructured":"International\u00a0Telecommunication Union. Recommendation x.509 (1997 e): Information technology open systems interconnection - the directory: Authentication framework, 6-1997 (1997) Also published as ISO\/IEC International Standard 9594-8","key":"20_CR24"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:21:37Z","timestamp":1619493697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11957454_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}