{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:22:14Z","timestamp":1778127734754,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"},{"value":"9783540464167","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-46416-6_22","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"257-265","source":"Crossref","is-referenced-by-count":1156,"title":["Group Signatures"],"prefix":"10.1007","author":[{"given":"David","family":"Chaum","sequence":"first","affiliation":[]},{"given":"Eug\u00e8ne","family":"van Heyst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-48184-2_11","volume-title":"Advances in Cryptology-CRYPTO 87","author":"E. Brickell","year":"1988","unstructured":"Ernest Brickell, David Chaum, Ivan Damgard and Jeroen van de Graaf, Gradual and verifiable release of a secret, Advances in Cryptology-CRYPTO 87, C. Pomerance ed., Lecture Notes in Computer Science 293, Springer-Verlag, pp. 156\u2013166."},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/3-540-39805-8_28","volume-title":"Advances in Cryptology-EUROCRYPT 85","author":"D. Chaum","year":"1986","unstructured":"David Chaum, Showing credentials without identification, Advances in Cryptology-EUROCRYPT 85, F. Pichler ed., Lecture Notes in Computer Science 219, Springer-Verlag, pp. 241\u2013244."},{"key":"22_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/3-540-39118-5_21","volume-title":"Advances in Cryptology-EUROCRYPT 87","author":"D. Chaum","year":"1988","unstructured":"David Chaum, Blinding for unanticipated signatures, Advances in Cryptology-EUROCRYPT 87, D. Chaum, W. Price eds., Lecture Notes in Computer Science 304, Springer-Verlag, pp. 227\u2013233."},{"key":"22_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology-EUROCRYPT 90","author":"D. Chaum","year":"1991","unstructured":"David Chaum, Zero-knowledge undeniable signatures, Advances in Cryptology-EUROCRYPT 90, I. Damg\u00e5rd ed., Lecture Notes in Computer Science 473, Springer-Verlag, pp. 458\u2013464."},{"key":"22_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology-CRYPTO 89","author":"D. Chaum","year":"1990","unstructured":"David Chaum and Hans van Antwerpen, Undeniable signatures, Advances in Cryptology-CRYPTO 89, G. Brassard ed., Lecture Notes in Computer Science 435, Springer-Verlag, pp. 212\u2013216."},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Advances in Cryptology-EUROCRYPT 87","author":"D. Chaum","year":"1988","unstructured":"David Chaum, Jan-Hendrik Evertse and Jeroen van de Graaf, An improved protocol for demonstrating possession of discrete logarithms and some generalizations, Advances in Cryptology-EUROCRYPT 87, D. Chaum, W. Price eds., Lecture Notes in Computer Science 304, Springer-Verlag, pp. 127\u2013141."},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE IT 31 (1985), pp. 469\u2013472.","journal-title":"IEEE IT"},{"key":"22_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology-CRYPTO 86","author":"A. Fiat","year":"1987","unstructured":"Amos Fiat and Adi Shamir, How to prove yourself: practical solution to identification and signature problems, Advances in Cryptology-CRYPTO 86, A.M. Odlyzko ed., Lecture Notes in Computer Science 263, Springer-Verlag, pp. 186\u2013194."},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/3-540-46877-3_40","volume-title":"Advances in Cryptology-EUROCRYPT 90","author":"K. Ohta","year":"1991","unstructured":"Kazuo Ohta, Tatsuaki Okamoto and Kenji Koyama, Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme, Advances in Cryptology-EUROCRYPT 90, I. Damg\u00e5rd ed., Lecture Notes in Computer Science 473, Springer-Verlag, pp. 446\u2013457."},{"key":"22_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-39805-8_8","volume-title":"Advances in Cryptology-EUROCRYPT 85","author":"R. Peralta","year":"1986","unstructured":"Ren\u00e9 Peralta, Simultaneous security of bits in the discrete log, Advances in Cryptology-EUROCRYPT 85, F. Pichler ed., Lecture Notes in Computer Science 219, Springer-Verlag, pp. 62\u201372."},{"key":"22_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BFb0030368","volume-title":"Advances in Cryptology AUSCRYPT 90","author":"H. Shizuya","year":"1990","unstructured":"Hiroki Shizuya, Kenji Koyama and Toshiya Itoh, Demonstrating possession without revealing factors and its applications, Advances in Cryptology AUSCRYPT 90, J. Seberry and J. Pieprzyk eds., Lecture Notes in Computer Science 453, Springer-Verlag, pp. 273\u2013293."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Schrift and Shamir, The discrete log is very discreet, Proc. 22 nd STOC 1990, pp. 405\u2013415.","DOI":"10.1145\/100216.100271"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:47:06Z","timestamp":1556725626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540546207","9783540464167"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1991]]}}}