{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:23Z","timestamp":1725485903495},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_28","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"407-420","source":"Crossref","is-referenced-by-count":8,"title":["Non-interactive Auction Scheme with Strong Privacy"],"prefix":"10.1007","author":[{"given":"Kun","family":"Peng","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Kapali","family":"Viswanathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"28_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-45664-3_8","volume-title":"Public Key Cryptology 2002","author":"M. Abe","year":"2002","unstructured":"Masayuki Abe and Koutarou Suzuki. M+1-st price auction using homomorphic encryption. In Public Key Cryptology 2002, pages 115\u2013124, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 2288. 409"},{"key":"28_CR2","unstructured":"Colin Boyd and Wenbo Mao. Security issues for electronic auctions. Technical report, 2000. available at http:\/\/www.hpl.hl.com\/techreports\/2000\/HP-2000-90.html . 408"},{"key":"28_CR3","series-title":"Lect Notes Comput Sci","first-page":"89","volume-title":"Advances in Cryptology-Crypto\u2019 92","author":"D. Chaum","year":"1992","unstructured":"D. Chaum and T.P. Pedersen. Wallet databases with observers. In Ernest F. Brickell, editor, Advances in Cryptology-Crypto\u2019 92, pages 89\u2013105, Berlin, 1992. Springer-Verlag. Lecture Notes in Computer Science Volume 740. 410"},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/3-540-45439-X_28","volume-title":"Efficient sealed-bid auctions for massive numbers of bidders with lump comparison","author":"K. Chida","year":"2001","unstructured":"Koji Chida, Kunio Kobayashi, and Hikaru Morita. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In Information Security, 4th International Conference, ISC 2001, pages 408\u2013419, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2200. 409"},{"key":"28_CR5","unstructured":"H Kikuchi, Michael Harkavy, and J D Tygar. Multi-round anonymous auction. In Proceedings of the First IEEE Workshop on Dependable and Real-Time ECommerce Systems, pages 62\u201369, June 1998. 409"},{"key":"28_CR6","series-title":"Lect Notes Comput Sci","first-page":"291","volume-title":"The Fifth International Conference on Financial Cryptography 2001","author":"H. Kikuchi","year":"2001","unstructured":"Hiroaki Kikuchi. (m+1)st-price auction. In The Fifth International Conference on Financial Cryptography 2001, pages 291\u2013298, Berlin, February 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2339. 409"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe, and Shohachiro Nakanishi. Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In proc. of International Workshop on Next Generation Internet (NGITA2000), IEEE, pages 307\u2013312, July 2000. 409","DOI":"10.1109\/PADSW.2000.884610"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"David Naccache and Jacques Stern. A new public key cryptosystem based on higher residues. In ACM Computer Science Conference 1998, pages 160\u2013174, 1998. 410","DOI":"10.1145\/288090.288106"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Kazumasa Omote and Atsuko Miyaji. A second-price sealed-bid auction with the discriminant of the p-th root. In Financial Cryptography 2002, Berlin, 2002. Springer-Verlag. 409","DOI":"10.1007\/3-540-36504-4_5"},{"key":"28_CR10","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"Eurocrypt\u201999","author":"P. Paillier","year":"1999","unstructured":"P Paillier. Public key cryptosystem based on composite degree residuosity classes. In Eurocrypt\u201999, pages 223\u2013238, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science Volume 1592. 417"},{"key":"28_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-540-46588-1_28","volume-title":"Public Key Cryptology 2000","author":"K. Sako","year":"2000","unstructured":"K Sako. An auction scheme which hides the bids of losers. In Public Key Cryptology 2000, pages 422\u2013432, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1880. 409"},{"key":"28_CR12","unstructured":"Kouichi Sakurai and S Miyazaki. A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electronic bidding without anonymous channels nor trusted centers. In Proc. International Workshop on Cryptographic Techniques and E-Commerce, pages 180\u2013187, Hong Kong, 1999. City University of Hong Kong Press. 409"},{"key":"28_CR13","series-title":"Lect Notes Comput Sci","first-page":"183","volume-title":"Effcient sealed-bid auction using hash chain","author":"K. Suzuki","year":"2000","unstructured":"Koutarou Suzuki, Kunio Kobayashi, and Hikaru Morita. Effcient sealed-bid auction using hash chain. In International Conference on Information Security and Cryptology 2000, pages 183\u2013191, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 2015. 408, 409"},{"key":"28_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/10718964_34","volume-title":"A three phased schema for sealed bid auction system design","author":"K. Viswanathan","year":"2000","unstructured":"Kapali Viswanathan, Colin Boyd, and Ed Dawson. A three phased schema for sealed bid auction system design. In Information Security and Privacy, 5th Australasian Conference, ACISP\u20192000, pages 412\u2013426, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science 1841. 408"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Yuji Watanabe and Hideki Imai. Reducing the round complexity of a sealed-bid auction protocol with an off-line ttp. In STOC 2000, pages 80\u201386. ACM, 2000. 407, 408, 409, 418","DOI":"10.1145\/352600.352612"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T07:16:07Z","timestamp":1683875767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}