{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:07Z","timestamp":1725488767579},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540419631"},{"type":"electronic","value":"9783540454151"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45415-2_2","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T00:50:58Z","timestamp":1186534258000},"page":"20-32","source":"Crossref","is-referenced-by-count":9,"title":["A Fair Electronic Cash Scheme"],"prefix":"10.1007","author":[{"given":"Yi","family":"Mu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khanh Quoc","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,4,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"S. Brands. Rapid demonstration of linear relations connected by boolean operators. In Advances in Cryptology-Eurocrypt'97, pages 318\u2013333. LNCS vol. 1223, Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_22"},{"key":"2_CR2","volume-title":"In symposium on Distributed Algorithms(SODA)","author":"E.F. Brickell","year":"1995","unstructured":"E.F. Brickell, P. Gemmell, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In In symposium on Distributed Algorithms(SODA). Albuquerque, NM. Available from http:\/\/www.cs.sandia.gov\/psgemme\/ ., 1995."},{"key":"2_CR3","unstructured":"J. Camenisch. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problems. PhD thesis, Swiss Federal Institute of Technology, Zurich, 1998. 28 Y. Mu, K.Q. Nguyen, and V. Varadharajan"},{"key":"2_CR4","first-page":"106","volume":"1592","author":"J. Camenisch","year":"1999","unstructured":"J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. Technical Report RS-98-29, BRICS, 1999. an abstract version appeared in Proceeding of Eurocrypt'99, LNCS vol. 1592, pages. 106\u2013121.","journal-title":"Technical Report RS-98-29, BRICS, 1999. an abstract version appeared in Proceeding of Eurocrypt'99"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J. M. Piveteau, and M. Stadler. Blind signatures based on the discrete logarithm problem. In Advances in Cryptology-Eurocrypt'94, pages 428\u2013432. LNCS vol. 950, Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053458"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"M. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS'96, pages 33\u201343. LNCS vol. 1146, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61770-1_26"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, J. Evertse, and J. van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In Advances in Cryptology-EUROCRYPT'87, pages 127\u2013141. LNCS vol. 304, Springer-Verlag,1988.","DOI":"10.1007\/3-540-39118-5_13"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"R. Cramer and T.P. Pedersen. Improved privacy in wallets with observers. In Advances of Cryptology-Eurocrypt'93, pages 329\u2013343. LNCS vol. 765, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_29"},{"key":"2_CR9","unstructured":"G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in e-cash. In Proceedings of 1st Financial Cryptography conference. LNCS vol. 1318, Springer-Verlag, 1997."},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1:77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identi_cation and signature problems. In Advances in Cryptology-CRYPTO'86, pages 186\u2013194. LNCS vol. 263, Springer-Verlag, 1987.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"2_CR12","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung. Indirect discourse proofs: achieving fair on-line e-cash. In Advances in Cryptology-ASIACRYPT'96, pages 286\u2013300. LNCS vol. 1163, Springer-Verlag, 1996."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"E. Fujisaki and T. Okamoto. Statistical zero-knowledge protocols to prove modular polynomial relation. In Advances in Cryptology-CRYPTO'97, pages 16\u201330. LNCS vol. 1294, Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052225"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"J. Piveteau J. Camenisch and M. Stadler. An efficient payment system protecting privacy. In Computer Security-ESORICS'94, pages 207\u2013215. LNCS vol. 875, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58618-0_65"},{"key":"2_CR15","unstructured":"Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan. A new digital cash scheme based on blind nyberg-rueppel digital signature. In Information Security Workshop, pages 312\u2013320. LNCS vol. 1396, Springer-Verlag, 1997."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"T. Okamoto. An efficient divisible electronic cash scheme. In Advances in Cryptology-CRYPTO'95, pages 439\u2013451. LNCS vol. 963, Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_35"},{"key":"2_CR17","unstructured":"M. Stadler. Cryptographic Protocols for Revocable Privacy. PhD thesis, Swiss Federal Institute of Technology, Zurich, 1996."},{"issue":"6","key":"2_CR18","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"B. Solms","year":"1992","unstructured":"B. von Solms and D. Naccache. On blind signatures and perfect crimes. Computer and Security, 11(6):581\u2013583, 1992.","journal-title":"Computer and Security"}],"container-title":["Lecture Notes in Computer Science","Electronic Commerce Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45415-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T20:33:49Z","timestamp":1556742829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45415-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540419631","9783540454151"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45415-2_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}