{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:00:00Z","timestamp":1725890400695},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540676270"},{"type":"electronic","value":"9783540451518"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45151-x_18","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T07:14:10Z","timestamp":1187248450000},"page":"189-197","source":"Crossref","is-referenced-by-count":4,"title":["A Protocol for Untraceable Electronic Cash"],"prefix":"10.1007","author":[{"given":"Hua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,7]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology. Proc. Crypto\u201982, pp:199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor. Un traceable electronic cash. In Advances in Cryptology Crypto\u2019 88, pp:319\u2013327. Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"D. Simon. Anonymous communication and anonymous cash. Advances in Cryptology, Proc. of Crypto\u2019 96, pp:61\u201373, Springer-Verlag, 1991.","DOI":"10.1007\/3-540-68697-5_5"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Y. Yacobi. Efficien telectronic money. Advances in Cryptology, Proc. of Asiacrypt\u2019 94, pp: 153\u2013163. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0000431"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta. Disposable zero-kno wledge authen tication and their applications to untraceable electronic cash. Advances in Cryptology, Proc. of Crypto\u2019 89, pp:481\u2013496, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_43"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. How to break and repair a \u2018provably secure\u2019 untraceable payment system. Advances in Cryptology, Proc. of Crypto\u201991, pp:338\u2013350, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_28"},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-56939-1_78","volume-title":"Proc. of the twentieth International Colloquium on Automata, Languages and Programming(ICALP 1993)","author":"M. Franklin","year":"1993","unstructured":"M. Franklin and M. Yung. Secure and efficient off-line digital money. In Proc. of the twentieth International Colloquium on Automata, Languages and Programming(ICALP 1993). (Lecture Notes in Computer Science 700), pp: 265\u2013276. Springer-Verlag, 1993."},{"key":"18_CR8","volume-title":"Research report NU-CCS-96-03","author":"A. Chan","year":"1995","unstructured":"A. Chan, Y. Frankel, and Y. Tsiounis. An efficient off-line electronic cash scheme as secure as RSA. Research report NU-CCS-96-03, Northeastern University, Boston, Massachussets, 1995."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"T. Okamoto. An efficient divisible electronic cash scheme. Advances in Cryptology. Proc. of Crypto\u201995, pp:438\u2013451. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_35"},{"key":"18_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/BFb0034855","volume-title":"Asiacrypt\u201996","author":"Y. Frankel","year":"1996","unstructured":"Y. Frankel, T. Yiannis and M. Yung. Indirect Discourse Proofs: Achieving Fair Off-Line Electronic Cash. Asiacrypt\u201996, Lecture Notes in Computer Science 1163, pp: 286\u2013300."},{"key":"18_CR11","series-title":"Lect Notes Comput Sci","first-page":"240","volume-title":"Asiacrypt\u201998","author":"T. Yiannis","year":"1998","unstructured":"T. Yiannis. Fair Off-Line Cash made easy. Asiacrypt\u201998, Lecture Notes in Computer Science 1346, pp:240\u2013252."},{"key":"18_CR12","unstructured":"T. Yiannis, M. Yung. On the security of ElGamal-based encryption. In 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC\u2019 98), Japan, pp:37\u201349."},{"key":"18_CR13","unstructured":"M. Bellare and P. Roga way. Random oracles are practical: a paradigm for designing efficient protocols. In First ACM Conference on Computer and Communications Security, pp:62\u201373, 1993."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21,2 (Feb. 1978), pp:120\u2013126.","DOI":"10.1145\/359340.359342"}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45151-X_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:29:37Z","timestamp":1556756977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45151-X_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540676270","9783540451518"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45151-x_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}