{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:14:21Z","timestamp":1725488061970},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006466"},{"type":"electronic","value":"9783540365044"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36504-4_5","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T18:48:45Z","timestamp":1184957325000},"page":"57-71","source":"Crossref","is-referenced-by-count":22,"title":["A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root"],"prefix":"10.1007","author":[{"given":"Kazumasa","family":"Omote","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the 5-th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002)","author":"M. Abe","year":"2002","unstructured":"M. Abe and K. Suzuki. \u201cM+l-st Price Auction Using Homomorphic Encryption\u201d. In Proceedings of the 5-th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002), LNCS, Springer-Verlag, page to appear, 2002."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"C. Cachin. \u201cEfficient Private Bidding and Auctions with an Oblivious Third Party\u201d. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 120\u2013127, 1999.","DOI":"10.1145\/319709.319726"},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","first-page":"160","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 98","author":"J. Camenisch","year":"1998","unstructured":"J. Camenisch and M. Michels. \u201cA Group Signature Scheme with Improved Efficiency\u201d. In Advances in Cryptology-ASIACRYPT\u2019 98, LNCS 1514, Springer-Verlag, pages 160\u2013174, 1998."},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/3-540-45439-X_28","volume-title":"Proceedings of the 4th Information Security Conference (ISC 2001)","author":"K. Chida","year":"2001","unstructured":"K. Chida, K. Kobayashi, and H. Morita. \u201cEfficient Sealed-bid Auctions for Massive Numbers of Bidders with Lump Comparison\u201d. In Proceedings of the 4th Information Security Conference (ISC 2001), LNCS 2200, Springer-Verlag, pages 408\u2013419, 2001."},{"key":"5_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-44448-3_13","volume-title":"Advances in Cryptology-ASIACRYPT 2000","author":"M. Jakobsson","year":"2000","unstructured":"M. Jakobsson and A. Juels. \u201cMix and Match: Secure Function Evaluation via Ciphertexts\u201d. In Advances in Cryptology-ASIACRYPT 2000, LNCS 1976, Springer-Verlag, pages 162\u2013177, 2000."},{"key":"5_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the 5th International Financial Cryptography (FC 2001)","author":"H. Kikuchi","year":"2001","unstructured":"H. Kikuchi. \u201c(M+l)st-Price Auction Protocol\u201d. In Proceedings of the 5th International Financial Cryptography (FC 2001), LNCS, Springer-Verlag, page to appear, 2001."},{"key":"5_CR7","unstructured":"H. Kikuchi, M. Harkavy, and D. Tyger. \u201cMulti-round anonymous auction protocols\u201d. In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 62\u201369, 1998."},{"issue":"l","key":"5_CR8","first-page":"289","volume":"E84-A","author":"K. Kobayashi","year":"2001","unstructured":"K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta. \u201cEfficient Sealed-bid Auction by Using One-way Functions\u201d. IEICE Trans. Fundamentals, Vol.E84-A,No.l:pp.289\u2013294, 2001.","journal-title":"IEICE Trans. Fundamentals"},{"issue":"l","key":"5_CR9","first-page":"20","volume":"E81-A","author":"M. Kudo","year":"1998","unstructured":"M. Kudo. \u201cSecure electronic sealed-bid auction protocol with public key cryptography\u201d. IEICE Trans. Fundamentals, Vol.E81-A,No.l:pp.20\u201327, 1998.","journal-title":"IEICE Trans. Fundamentals"},{"issue":"l","key":"5_CR10","first-page":"77","volume":"E82-A","author":"M. Manbo","year":"1999","unstructured":"M. Manbo and H. Shizuya. \u201cA Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme\u201d. IEICE Trans. Fundamentals, Vo1.E82-A,No.l:77\u201380, 1999.","journal-title":"IEICE Trans. Fundamentals"},{"issue":"8","key":"5_CR11","first-page":"2161","volume":"41","author":"T. Nakanishi","year":"2000","unstructured":"T. Nakanishi, T. Fujiwara, and H. Watanabe. \u201cAn Anonymous Bidding Protocol without Any Reliable Center\u201d. Trans. IPS Japan, Vol.41,No.8:pp.2161\u20132169, 2000.","journal-title":"Trans. IPS Japan"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"M. Naor, B. Pinkas, and R. Sumner. \u201cPrivacy Preserving Auctions and Mechanism Design\u201d. In Proceedings of ACM Conference on Electronic Commerce, pages 120\u2013127, 1999.","DOI":"10.1145\/336992.337028"},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/3-540-44456-4_9","volume-title":"Proceedings of Information Security Workshop (ISW 2000)","author":"K. Omote","year":"2000","unstructured":"K. Omote and A. Miyaji. \u201cAn Anonymous Auction Protocol with a Single Nontrusted Center using Binary Trees\u201d. In Proceedings of Information Security Workshop (ISW 2000), LNCS 1975, Springer-Verlag, pages 108\u2013120, 2000."},{"issue":"8","key":"5_CR14","first-page":"2049","volume":"42","author":"K. Omote","year":"2001","unstructured":"K. Omote and A. Miyaji. \u201cAn Anonymous Sealed-bid Auction with a Feature of Entertainment\u201d. Trans. IPS Japan, Vol.42, No.8:pp.2049\u20132056, 2001.","journal-title":"Trans. IPS Japan"},{"key":"5_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-540-46588-1_28","volume-title":"Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2000)","author":"K. Sako","year":"2000","unstructured":"K. Sako. \u201cAn Auction Protocol Which Hides Bids of Losers\u201d. In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2000), LNCS 1751, Springer-Verlag, pages 422\u2013432, 2000."},{"key":"5_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10718964_32","volume-title":"Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000)","author":"K. Sakurai","year":"2000","unstructured":"K. Sakurai and S. Miyazaki. \u201cAn Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme\u201d. In Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000), LNCS 1841, Springer-Verlag, pages 385\u2013399, 2000."},{"key":"5_CR17","series-title":"Lect Notes Comput Sci","first-page":"189","volume-title":"Proceedings of the Third International Conference on Information Security and Cryptology (ICISC 2000)","author":"K. Suzuki","year":"2000","unstructured":"K. Suzuki, K. Kobayashi, and H. Morita. \u201cEfficient Sealed-bid Auction Using Hash Chain\u201d. In Proceedings of the Third International Conference on Information Security and Cryptology (ICISC 2000), LNCS 2015, Springer-Verlag, pages 189\u2013197, 2000."},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"W. Vickrey. \u201cCounter Speculation, Auctions, and Competitive Sealed Tenders\u201d. Journal of Finance, Vol.16:pp.8\u201337, 1961.","journal-title":"Journal of Finance"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36504-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T05:18:36Z","timestamp":1550467116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36504-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006466","9783540365044"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-36504-4_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}