{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:48:40Z","timestamp":1769719720592,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_35","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"438-451","source":"Crossref","is-referenced-by-count":102,"title":["An Efficient Divisible Electronic Cash Scheme"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"35_CR1","unstructured":"Blum, M., \u201cCoin flipping by telephone\u201d, IEEE, COMPCON, pp.133\u2013137 (1982)."},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Brands, S., \u201cUntraceable Off-line Cash in Wallet with Observers\u201d, Proceedings of Crypto 93, pp.302\u2013318 (1994).","DOI":"10.1007\/3-540-48329-2_26"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Bleumer, G., Pfitzmann, B. and Waidner, M., \u201cA Remark on a Signature Scheme Where Forgery can be Proved\u201d, Proceedings of Eurorypt 90, pp.441\u2013445 (1991).","DOI":"10.1007\/3-540-46877-3_39"},{"issue":"10","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D., \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete,\u201d Comm. of the ACM, 28,10, pp.1030\u20131044 (1985).","journal-title":"Comm. of the ACM"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D., Fiat, A., and Naor, M., \u201cUntraceable Electronic Cash,\u201d Proceedings of Crypto 88, pp.319\u2013327 (1990).","DOI":"10.1007\/0-387-34799-2_25"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Heijst, E., and Pfitzmann, B., \u201cCryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer,\u201d Proceedings of Crypto 91, pp.470\u2013484 (1992).","DOI":"10.1007\/3-540-46766-1_38"},{"key":"35_CR7","unstructured":"Damg\u00e5rd, I., \u201cPractical and Provably Secure Release of a Secret and Exchange of Signatures,\u201d Proceedings of Eurocrypt 93 (1993)."},{"key":"35_CR8","unstructured":"D\u2019amingo, S. and Di Crescenzo, G., \u201cMethodology for Digital Money based on General Cryptographic Tools\u201d, to appear in the Proceedings of Eurocrypt 94."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"De Santis, A. and Persiano, G., \u201cCommunication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)\u201d Proceedings of STACS 92, pp. 449\u2013460 (1992).","DOI":"10.1007\/3-540-55210-3_204"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Even, S., Goldreich, O. and Yacobi, Y., \u201cElectronic Wallet\u201d, Proceedings of Crypto 83, pp.383\u2013386 (1983).","DOI":"10.1007\/978-1-4684-4730-9_28"},{"key":"35_CR11","unstructured":"Eng, T. and Okamoto, T. \u201cSingle-Term Divisible Coins,\u201d to appear in the Proceedings of Eurocrypt 94."},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Ferguson, N., \u201cSingle Term Off-line Coins\u201d, Proceedings of Eurocrypt 93, pp.318\u2013328 (1994).","DOI":"10.1007\/3-540-48285-7_28"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Franklin, M. and Yung, M., \u201cSecure and Efficient Off-Line Digital Money\u201d, Proceedings of ICALP 93, pp. 449\u2013460 (1993).","DOI":"10.1007\/3-540-56939-1_78"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., and Micali, S., \u201cHow to Construct Random Functions,\u201d Journal of ACM, Vol.33, No.4 (1986).","DOI":"10.1145\/6490.6503"},{"issue":"2","key":"35_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S. and Rivest, R., \u201cA Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,\u201d SIAM J. Comput., 17,2, pp.281\u2013308 (1988).","journal-title":"SIAM J. Comput."},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Hayes, B., \u201cAnonymous One-Time Signatures and Flexible Untraceable Electronic Cash,\u201d Proceedings of Auscrypt 90, pp.294\u2013305 (1990).","DOI":"10.1007\/BFb0030369"},{"key":"35_CR17","unstructured":"Knuth, D.E. The Art of Computer Programming, Vol.2, 2nd Ed. Addison-Wesley (1981)."},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Okamoto, T., and Ohta, K., \u201cDisposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash\u201d, Proceedings of Crypto 89, pp. 481\u2013496 (1990).","DOI":"10.1007\/0-387-34805-0_43"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Okamoto, T., and Ohta, K., \u201cUniversal Electronic Cash\u201d, Proceedings of Crypto 91, pp. 324\u2013337 (1992).","DOI":"10.1007\/3-540-46766-1_27"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Pailles, J.C., \u201cNew Protocols for Electronic Money\u201d, Proceedings of Auscrypt 92, pp. 263\u2013274 (1993).","DOI":"10.1007\/3-540-57220-1_68"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Pedersen, T. P., \u201cNon-Interactive and Information-Theoretic Secure Verifiable Secret Sharing\u201d, Proceedings of Crypto 91, pp. 129\u2013140 (1992).","DOI":"10.1007\/3-540-46766-1_9"},{"key":"35_CR22","unstructured":"Pfitzmann, B. and Waidner, M., \u201cHow to Break and Repair a \u201cProvably Secure\u201d Untraceable Payment System,\u201d Proceedings of Crypto 91 (1992)."},{"key":"35_CR23","unstructured":"Rabin, M.O., \u201cDigitalized Signatures and Public-Key Functions as Intractable as Factorization,\u201d Tech. Rep., MIT\/LCS\/TR-212, MIT Lab. Comp. Sci., (1979)."},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Vaudenay, S., \u201cOne-Time Identification with Low Memory,\u201d Eurocodes 92 (1992).","DOI":"10.1007\/978-3-7091-2786-5_19"},{"key":"35_CR25","unstructured":"Yacobi, Y., \u201cEfficient electronic money\u201d, to appear in the Proceedings of Asiacrypt 94."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T20:21:08Z","timestamp":1684009268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_35","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}