{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T23:01:23Z","timestamp":1765062083522},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540424567"},{"type":"electronic","value":"9783540446477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_23","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"388-407","source":"Crossref","is-referenced-by-count":22,"title":["An Identity Escrow Scheme with Appointed Verifiers"],"prefix":"10.1007","author":[{"given":"Jan","family":"Camenisch","sequence":"first","affiliation":[]},{"given":"Anna","family":"Lysyanskaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"issue":"4","key":"23_CR1","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):591\u2013610, 2000.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"23_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO 2000, vol. 1880 of LNCS, pp. 255\u2013270. Springer Verlag, 2000."},{"key":"23_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"EUROCRYPT\u2019 97","author":"N. Bari\u0107","year":"1997","unstructured":"N. Bari\u0107 and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In EUROCRYPT\u2019 97, vol. 1233 of LNCS, pp. 480\u2013494."},{"key":"23_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"EUROCRYPT\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In EUROCRYPT\u2019 98, vol. 1403 of LNCS, pp. 236\u2013250. Springer Verlag, 1998."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"J. C. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections (extended abstract). In Proc. 26th STOC, pp. 544\u2013553. ACM, 1994.","DOI":"10.1145\/195058.195407"},{"key":"23_CR6","series-title":"Lect Notes Comput Sci","first-page":"302","volume-title":"CRYPTO\u2019 93","author":"S. Brands","year":"1993","unstructured":"S. Brands. Untraceable off-line cash in wallets with observers. In CRYPTO\u2019 93, vol. 773 of LNCS, pp. 302\u2013318, 1993."},{"key":"23_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-44448-3_32","volume-title":"ASIACRYPT 2000","author":"J. Camenisch","year":"2000","unstructured":"J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT 2000, vol. 1976 of LNCS, pp. 415\u2013428. Springer Verlag, 2000."},{"key":"23_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-44448-3_25","volume-title":"ASIACRYPT 2000","author":"J. Camenisch","year":"2000","unstructured":"J. Camenisch and I. Damg\u00e5rd. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In ASIACRYPT 2000, vol. 1976 of LNCS, pp. 331\u2013345, 2000."},{"key":"23_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93\u2013118. Springer Verlag, 2001."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"J. Camenisch and A. Lysyanskaya. An identity escrow scheme with appointed verifiers. http:\/\/eprint.iacr.org\/2001 , 2001.","DOI":"10.1007\/3-540-44647-8_23"},{"key":"23_CR11","series-title":"Lect Notes Comput Sci","first-page":"160","volume-title":"ASIACRYPT\u2019 98","author":"J. Camenisch","year":"1998","unstructured":"J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In ASIACRYPT\u2019 98, vol. 1514 of LNCS, pp. 160\u2013174. Springer Verlag, 1998."},{"key":"23_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"CRYPTO\u2019 97","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO\u2019 97, vol. 1296 of LNCS, pp. 410\u2013424. Springer Verlag, 1997."},{"key":"23_CR13","series-title":"PhD thesis","volume-title":"Studies in Secure Multiparty Computation and Applications","author":"R. Canetti","year":"1995","unstructured":"R. Canetti. Studies in Secure Multiparty Computation and Applications. PhD thesis, Weizmann Institute of Science, Rehovot 76100, Israel, June 1995."},{"issue":"1","key":"23_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R. Canetti","year":"2000","unstructured":"R. Canetti. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 13(1):143\u2013202, 2000.","journal-title":"Journal of Cryptology"},{"issue":"2","key":"23_CR15","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84\u201388, February 1981.","journal-title":"Communications of the ACM"},{"issue":"10","key":"23_CR16","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030\u20131044, Oct. 1985.","journal-title":"Communications of the ACM"},{"key":"23_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/BFb0053427","volume-title":"EUROCRYPT\u2019 94","author":"D. Chaum","year":"1994","unstructured":"D. Chaum. Designated confirmer signatures. In EUROCRYPT\u2019 94, vol. 950 of LNCS, pp. 86\u201391. Springer Verlag Berlin, 1994."},{"key":"23_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"CRYPTO\u2019 88","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO\u2019 88, vol. 403 of LNCS, pp. 319\u2013327. Springer Verlag, 1990."},{"key":"23_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"EUROCRYPT\u2019 91","author":"D. Chaum","year":"1991","unstructured":"D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT\u2019 91, vol. 547 of LNCS, pp. 257\u2013265. Springer-Verlag, 1991."},{"key":"23_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/BFb0053433","volume-title":"EUROCRYPT\u2019 94","author":"L. Chen","year":"1995","unstructured":"L. Chen and T. P. Pedersen. New group signature schemes. In EUROCRYPT\u2019 94, vol. 950 of LNCS, pp. 171\u2013181. Springer-Verlag, 1995."},{"key":"23_CR21","unstructured":"R. Cramer, I. Damg\u00e5rd, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. Manuscript. Available from http:\/\/eprint.iacr.org ."},{"key":"23_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"CRYPTO\u2019 98","author":"R. Cramer","year":"1998","unstructured":"R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO\u2019 98, vol. 1642 of LNCS, pp. 13\u201325, Berlin, 1998. Springer Verlag."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. In Proc. 6th ACM CCS, pp. 46\u201352. ACM press, nov 1999.","DOI":"10.1145\/319709.319716"},{"key":"23_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-45539-6_30","volume-title":"EUROCRYPT 2000","author":"I. Damg\u00e5rd","year":"2000","unstructured":"I. Damg\u00e5rd. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000, vol. 1807 of LNCS, pp. 431\u2013444. Springer Verlag, 2000."},{"key":"23_CR25","series-title":"Lect Notes Comput Sci","first-page":"105","volume-title":"CRYPTO\u2019 98","author":"C. Dwork","year":"1998","unstructured":"C. Dwork and A. Sahai. Concurrrent zero-knowledge: Reducing the need for timing constraints. In CRYPTO\u2019 98, vol. 1642 of LNCS, pp. 105\u2013120, 1998."},{"key":"23_CR26","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. In CRYPTO\u2019 86, vol. 263 of LNCS, pp. 186\u2013194, 1987."},{"key":"23_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"CRYPTO\u2019 97","author":"E. Fujisaki","year":"1997","unstructured":"E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO\u2019 97, vol. 1294 of LNCS, pp. 16\u201330, 1997."},{"key":"23_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-48910-X_9","volume-title":"EUROCRYPT\u2019 99","author":"R. Gennaro","year":"1999","unstructured":"R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In EUROCRYPT\u2019 99, vol. 1592 of LNCS, pp. 123\u2013139, 1999."},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/293411.293443","volume":"42","author":"D. M. Goldschlag","year":"1999","unstructured":"D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2):84\u201388, 1999.","journal-title":"Communications of the ACM"},{"key":"23_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In EUROCRYPT 2000, vol. 1807 of LNCS, pp. 539\u2013556, 2000."},{"key":"23_CR31","series-title":"Lect Notes Comput Sci","volume-title":"EUROCRYPT\u2019 96","author":"M. Jakobsson","year":"1996","unstructured":"M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT\u2019 96, vol. 1233 of LNCS, 1996."},{"key":"23_CR32","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/BFb0055727","volume-title":"CRYPTO\u2019 98","author":"J. Kilian","year":"1998","unstructured":"J. Kilian and E. Petrank. Identity escrow. In CRYPTO\u2019 98, vol. 1642 of LNCS, pp. 169\u2013185, Berlin, 1998. Springer Verlag."},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"A. Lysyanskaya and Z. Ramzan. Group blind digital signatures: A scalable solution to electronic cash. In Proc. Financial Cryptography, 1998.","DOI":"10.1007\/BFb0055483"},{"key":"23_CR34","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"EUROCRYPT\u2019 98","author":"T. Okamoto","year":"1998","unstructured":"T. Okamoto and S. Uchiyama A new public-key cryptosystem as secure as factoring. In EUROCRYPT\u2019 98, vol. 1403 of LNCS, pp. 308\u2013318, 1998."},{"key":"23_CR35","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"EUROCRYPT\u2019 99","author":"P. Paillier","year":"1999","unstructured":"P. Paillier. Public-key cryptosystems based on composite residuosity classes. In EUROCRYPT\u2019 99, vol. 1592 of LNCS, pp. 223\u2013239. Springer Verlag, 1999."},{"key":"23_CR36","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"CRYPTO\u2019 91","author":"T. P. Pedersen","year":"1992","unstructured":"T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO\u2019 91, vol. 576 of LNCS, pp. 129\u2013140. Springer Verlag, 1992."},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM CCS, pp. 245\u2013254. ACM press, nov 2000.","DOI":"10.1145\/352600.352639"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T10:22:12Z","timestamp":1556965332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}