{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T06:06:16Z","timestamp":1760249176740},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_9","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"108-120","source":"Crossref","is-referenced-by-count":13,"title":["An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees"],"prefix":"10.1007","author":[{"given":"Kazumasa","family":"Omote","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. on Information Theory, pages 469\u2013472, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"5","author":"M. Franklin","year":"1996","unstructured":"M. Franklin and M. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 5:302\u2013312, 1996.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9_CR3","unstructured":"M. Harkavy, D. Tyger, and H. Kikuchi. Electronic Auctions with Private Bids. In Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998."},{"key":"9_CR4","unstructured":"H. Kikuchi, M. Harkavy, and D. Tyger. Multi-round anonymous auction protocols. In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 62\u201369, 1998."},{"key":"9_CR5","unstructured":"K. Kobayashi and M. Morita. Efficient sealed-bid auction with quantitative competition using one-way functions. ISEC99-30, pages 31\u201337, 1999."},{"issue":"1","key":"9_CR6","first-page":"20","volume":"E81-A","author":"M. Kudo","year":"1998","unstructured":"M. Kudo. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals, E81-A(1):20\u201327, 1998.","journal-title":"IEICE Trans. Fundamentals"},{"key":"9_CR7","unstructured":"NIST. Secure Hash Standard (SHS). FIPS Publication 180\u20131, April 1995."},{"key":"9_CR8","unstructured":"C-S. Peng, M. Pulido, J. Lin, and M. Blough. The Design of an Internet-based Real Time Auction Systems. In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 70\u201378, 1998."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"R.L. Rivest. The MD5 message-digest algorithm. Internet Request for Comments, pages 302\u2013312, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"R.L. Rivest and A. Shamir. PayWord and MicroMint:Two simple micropayment schemes. To Appear at the RSA\u2019 96 Conference, May 1996.","DOI":"10.1007\/3-540-62494-5_6"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"K. Sako. An Auction Protocol Which Hides Bids of Losers. In Proceedings of PKC2000, pages 422\u2013432, 2000.","DOI":"10.1007\/978-3-540-46588-1_28"},{"key":"9_CR12","unstructured":"K. Sakurai and S. Miyazaki. A Bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electronic bidding without anonymous channels nor trusted centers in Cryptographic Techniques and E-Commerce. In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce(CryTEC\u2019 99), 1999."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22:612\u2013613, 1979.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:05:20Z","timestamp":1556816720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}