{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:18:04Z","timestamp":1766135884009,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540416586"},{"type":"electronic","value":"9783540445869"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44586-2_17","type":"book-chapter","created":{"date-parts":[[2007,10,7]],"date-time":"2007-10-07T02:53:49Z","timestamp":1191725629000},"page":"225-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Efficient Asymmetric Self-Enforcement Scheme with Public Traceability"],"prefix":"10.1007","author":[{"given":"Hirotaka","family":"Komaki","sequence":"first","affiliation":[]},{"given":"Yuji","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,5]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"M. Bellare","year":"1990","unstructured":"M. Bellare and S. Micali, \u201cNon-interactive oblivious transfer and applications,\u201d Advances in Cryptology-CRYPTO\u2019 89, LNCS 435, Springer-Verlag, pp.547\u2013557, 1990"},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45539-6_4","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"D. Bleichenbacher","year":"2000","unstructured":"D. Bleichenbacher and P.Q. Nguyen, \u201cNoisy Polynomial Interpolation and Noisy Chinese Remaindering,\u201d Advances in Cryptology-EUROCRYPT 2000, LNCS 1807, Springer-Verlag, pp.53\u201369, 2000"},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"D. Boneh","year":"1999","unstructured":"D. Boneh and M. Franklin, \u201cAn Efficient Public Key Traitor Tracing Scheme,\u201d Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666, Springer-Verlag, pp.338\u2013353,1999"},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat and M. Naor, \u201cTracing Traitors,\u201d Advances in Cryptology-CRYPTO\u2019 94, LNCS 839, Springer-Verlag, pp.257\u2013270, 1994"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"C. Dwork, J. Lotspiech and M. Naor, \u201cDigital Signets: Self-Enforcing Protection of Digital Information,\u201d Proc. of 28th ACM Symposium on Theory of Computing(STOC), pp.489\u2013498, 1996","DOI":"10.1145\/237814.237997"},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, \u201cDifferential Power Analysis,\u201d Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666, Springer-Verlag, pp.388\u2013397, 1999"},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0054123","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"K. Kurosawa","year":"1998","unstructured":"K. Kurosawa and Y. Desmedt, \u201cOptimum Traitor Tracing and Asymmetric Schemes,\u201d Advances in Cryptology-EUROCRYPT\u2019 98, LNCS 1403, Springer-Verlag, pp.145\u2013157, 1998"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J.L. Massey","year":"1969","unstructured":"J.L. Massey, \u201cShift Register Synthesis and BCH Decoding,\u201d IEEE Transactions on Information Theory, vol. IT-15, No.1, pp.122\u2013127, January 1969","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"M. Naor and B. Pinkas, \u201cOblivious Transfer and Polynomial Evaluation,\u201d Proc. of 31th ACM Symposium on Theory of Computing(STOC), pp.245\u2013254, 1999","DOI":"10.1145\/301250.301312"},{"key":"17_CR10","series-title":"Lect Notes Comput Sci","first-page":"49","volume-title":"Trials of Traced Traitors","author":"B. Pfitzmann","year":"1999","unstructured":"B. Pfitzmann, \u201cTrials of Traced Traitors,\u201d Proc. of Information Hiding, First International Workshop, LNCS 1174, Springer-Verlag, pp.49\u201364,1996"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, \u201cAsymmetric Fingerprinting for Lager Collusions,\u201d Proc. of ACM Conference on Computer and Communication Security, pp.151\u2013160,1997","DOI":"10.1145\/266420.266453"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","first-page":"46","volume-title":"Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems","author":"T. Sander","year":"1997","unstructured":"T. Sander and A. Ta-Shma, \u201cFlow Control: A New Approach for Anonymity Control in Electronic Cash Systems,\u201d Proc. of Financial Cryptography: Third International Conference, FC\u201999, LNCS 1648, Springer-Verlag, pp.46\u201361, 1999"},{"key":"17_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48892-8_12","volume-title":"Key Preassigned Traceability Schemes for Broadcast Encryption","author":"D.R. Stinson","year":"1999","unstructured":"D.R. Stinson and R. Wei, \u201cKey Preassigned Traceability Schemes for Broadcast Encryption,Proc. of SAC\u2019 98, LNCS 1556, Springer-Verlag, pp.144\u2013156, 1998"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"N.R. Wagner, \u201cFingerprinting,\u201d Proc. of IEEE 1983 Symposium on Security and Privacy, April, pp.18\u201322, 1983","DOI":"10.1109\/SP.1983.10018"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Y. Watanabe, G. Hanaoka and H. Imai, \u201cAsymmetric Public-Key Traitor Tracing without Trusted Agents,\u201d Proc. of the Symposium on Information Theory and Its Application (SITA 2000), October, 2000","DOI":"10.1007\/3-540-45353-9_29"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Y. Watanabe, G. Hanaoka and H. Imai, \u201cEfficient Asymmetric Public-Key Traitor Tracing without Trusted Agents,\u201dto appear in Proc. of the RSA Conference Cryptographer\u2019s Track, April, 2001 (to be published in LNCS)","DOI":"10.1007\/3-540-45353-9_29"},{"key":"17_CR17","unstructured":"Y. Watanabe, H. Komaki, G. Hanaoka and H. Imai, \u201cAsymmetric Traitor Tracing based on Oblivious Polynomial Evaluation,\u201d (in Japanese) IEICE Technical Report, ISEC, September, 2000"},{"key":"17_CR18","unstructured":"S.B. Wicker, \u201cError Control Systems for Digital Communication and Storage,\u201d Prentice-Hall, Inc., 1995"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44586-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T10:11:41Z","timestamp":1684059101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44586-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416586","9783540445869"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44586-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"5 June 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}