{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:37:06Z","timestamp":1725493026091},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405153"},{"type":"electronic","value":"9783540450672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45067-x_3","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T00:29:51Z","timestamp":1193272191000},"page":"27-38","source":"Crossref","is-referenced-by-count":10,"title":["An Anonymous Credential System and a Privacy-Aware PKI"],"prefix":"10.1007","author":[{"given":"Pino","family":"Persiano","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48390-X_15","volume-title":"Financial Cryptography 1999","author":"G. Ateniese","year":"1999","unstructured":"G. Ateniese and G. Tsudik, Some open issues and new directions in group signatures. Financial Cryptography 1999, volume 1648 of LNCS."},{"doi-asserted-by":"crossref","unstructured":"S. Brands, Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy. MIT Press, 2000.","key":"3_CR2","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"3_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of International Security Conference (ISC 2002)","author":"E. Bresson","year":"2002","unstructured":"E. Bresson and J. Stern., Proofs of knowledge for non-monotone discrete-log formulae and applications. In Proceedings of International Security Conference (ISC 2002), volume 2433 of LNCS."},{"unstructured":"J. Camenisch., A note on one of the assumptions. Jan Camenisch Home Page \u2014 Selected Publications.","key":"3_CR4"},{"key":"3_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Eurocrypt 2001","author":"J. Camenisch","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya. An efficient non-transferable anonymous multishow credential system with optional anonymity revocation, Eurocrypt 2001, volume 2045 of LNCS."},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Crypto 2002","author":"J. Camenisch","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. Crypto 2002, volume 2442 of LNCS."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Eurocrypt 99","author":"J. Camenisch","year":"1999","unstructured":"J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. Eurocrypt 99, volume 1592 of LNCS."},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052252","volume-title":"Crypto 97","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. Crypto 97, volume 1294 of LNCS."},{"unstructured":"D. Chaum. Blind signatures for untraceable payments. Crypto 82.","key":"3_CR9"},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Crypto\u2019 86","author":"D. Chaum","year":"1987","unstructured":"D. Chaum and J. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. Crypto\u2019 86, volume 263 of LNCS."},{"doi-asserted-by":"crossref","unstructured":"A. De Santis, G. Di Crescenzo, G. Persiano, and M. Yung. On monotone formula closure of SZK. FOCS 1994.","key":"3_CR11","DOI":"10.1109\/SFCS.1994.365745"},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Crypto\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Crypto\u2019 86, volume 263 of LNCS."},{"doi-asserted-by":"crossref","unstructured":"R. Housley, W. Polk, W. Ford, and D. Solo. Internet X509 public key infrastructure: Certificate and Certificate Revocation List (CRL) Profile. NetworkWorking Group, RFC 3280, April 2002.","key":"3_CR13","DOI":"10.17487\/rfc3280"},{"key":"3_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Selected Areas in Cryptography","author":"A. Lysyanskaya","year":"1999","unstructured":"A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. Proceedings of Selected Areas in Cryptography 1999, volume 1758 of LNCS."},{"doi-asserted-by":"crossref","unstructured":"A. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.","key":"3_CR15","DOI":"10.1201\/9781439821916"},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_31","volume-title":"ASIACRYPT 2001","author":"E. Verheul","year":"2001","unstructured":"E. Verheul. Self-blindable credential certificates from the weil pairing. ASIACRYPT 2001, volume 2248 of LNCS."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45067-X_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T00:05:17Z","timestamp":1556928317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45067-X_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405153","9783540450672"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45067-x_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}