{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:33Z","timestamp":1725490533976},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_10","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"121-134","source":"Crossref","is-referenced-by-count":19,"title":["Unlinkable Divisible Electronic Cash"],"prefix":"10.1007","author":[{"given":"Toru","family":"Nakanishi","sequence":"first","affiliation":[]},{"given":"Yuji","family":"Sugiyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"10_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-46766-1_28","volume-title":"Advances in Cryptology-CRYPTO\u201991","author":"B. Pfitzmann","year":"1992","unstructured":"Pfitzmann, B. and Waidner, M.: How to Break and Repair a \u201cProvably Secure\u201d Untraceable Payment System, Advances in Cryptology-CRYPTO\u201991, LNCS 576, Springer-Verlag, pp. 338\u2013350 (1992)."},{"key":"10_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/3-540-44750-4_35","volume-title":"Advances in Cryptology-CRYPTO\u201995","author":"T. A. Okamoto","year":"1995","unstructured":"Okamoto, T.: An Efficient Divisible Electronic Cash Scheme, Advances in Cryptology-CRYPTO\u201995, LNCS 963, Springer-Verlag, pp. 438\u2013451 (1995)."},{"key":"10_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/BFb0054154","volume-title":"Advances in Cryptology-EUROCRYPT\u201998","author":"A. Chan","year":"1998","unstructured":"Chan, A., Frankel, Y. and Tsiounis, Y.: Easy Come-Easy Go Divisible Cash, Advances in Cryptology-EUROCRYPT\u201998, LNCS 1403, Springer-Verlag, pp. 561\u2013575 (1998)."},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-47790-X_4","volume-title":"Unlinkable Electronic Coupon Protocol with Anonymity Control","author":"T. Nakanishi","year":"1999","unstructured":"Nakanishi, T., Haruna, N. and Sugiyama, Y.: Unlinkable Electronic Coupon Protocol with Anonymity Control, Proc. of Second International Information Security Workshop, ISW\u201999, LNCS 1729, Springer-Verlag, pp. 37\u201346 (1999)."},{"key":"10_CR5","first-page":"11","volume":"E81-A","author":"E. Fujisaki","year":"1998","unstructured":"Fujisaki, E. and Okamoto, T.: Practical Escrow Cash Schemes, IEICE trans. on Fundamentals., Vol. E81-A, No. 1, pp. 11\u201319 (1998).","journal-title":"IEICE trans. on Fundamentals"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"von Solms, S. and Naccache, D.: On Blind Signatures and Perfect Crimes, Computers and Security, Vol. 11, No. 6, pp. 581\u2013583 (1992).","journal-title":"Computers and Security"},{"key":"10_CR7","series-title":"Lect Notes Comput Sci","first-page":"307","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"Y. D. Y. Frankel","year":"1990","unstructured":"Frankel, Y. D. Y.: Threshold Cryptosystems, Advances in Cryptology-CRYPTO\u201989, LNCS 435, Springer-Verlag, pp. 307\u2013315 (1990)."},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology-CRYPTO\u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J. and Stadler, M.: Efficient Group Signature Schemes for Large Groups, Advances in Cryptology-CRYPTO\u201997, LNCS 1294, Springer-Verlag, pp. 410\u2013424 (1997)."},{"key":"10_CR9","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology-CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"Fiat, A. and Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology-CRYPTO\u2019 86, LNCS 263, Springer-Verlag, pp. 186\u2013194 (1987)."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Bellare, M. and Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, Proc. of First Annual Conference on Computer and Communications Security, Association for Computing Machinery, pp. 62\u201373 (1993).","DOI":"10.1145\/168588.168596"},{"key":"10_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology-EU-ROCRYPT\u201996","author":"M. Stadler","year":"1996","unstructured":"Stadler, M.: Publicly Verifiable Secret Sharing, Advances in Cryptology-EU-ROCRYPT\u201996, LNCS 1070, Springer-Verlag, pp. 190\u2013199 (1996)."},{"key":"10_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology-CRYPTO\u201984","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms, Advances in Cryptology-CRYPTO\u201984, LNCS 196, Springer-Verlag, pp. 10\u201318 (1985)."},{"key":"10_CR13","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO\u2019 82, Plenum Press, pp. 199\u2013203 (1983)."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T04:32:47Z","timestamp":1550896367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}