{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:43Z","timestamp":1773511063933,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540671855","type":"print"},{"value":"9783540465133","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-46513-8_14","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T10:47:23Z","timestamp":1186051643000},"page":"184-199","source":"Crossref","is-referenced-by-count":249,"title":["Pseudonym Systems"],"prefix":"10.1007","author":[{"given":"Anna","family":"Lysyanskaya","sequence":"first","affiliation":[]},{"given":"Ronald L.","family":"Rivest","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Sahai","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,27]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology\u2014CRYPTO 98, pages 26\u201340. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055718"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In First ACM Conference on Computer and Communications Security, pages 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Dan Boneh. The decision Diffie-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symposium, pages 48\u201363. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054851"},{"key":"14_CR4","unstructured":"David Brin. The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? Perseus Press, 1998."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Markus Stadler. Efficient group signature schemes for large groups (extended abstract). In Advances in Cryptology\u2014CRYPTO\u2019 97, pages 410\u2013424. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052252"},{"key":"14_CR6","unstructured":"Ran Canetti, Moses Charikar, Ravi Kumar, Sridhar Rajagopalan, Amit Sahai, and Andrew Tomkins. Non-transferable anonymous credentials. Manuscript, 1998. Revision in submission, 1999."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Ran Canetti, Oded Goldreich, and Shai Halevi. Random oracle methodology, revisited. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pages 209\u2013218, 1998.","DOI":"10.1145\/276698.276741"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"David Chaum. Security without identification: transaction systems to make Big Brother obsolete. Communications of the ACM, 28(10), 1985.","DOI":"10.1145\/4372.4373"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"David Chaum. Designated confirmer signatures. In Advances in Cryptology\u2014EUROCRYPT 94, pages 86\u201391. Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053427"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"David Chaum and Jan-Hendrik Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology\u2014CRYPTO\u2019 86, pages 118\u2013167. Springer-Verlag, 1986.","DOI":"10.1007\/3-540-47721-7_10"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"David Chaum and Torben Pryds Pedersen. Wallet databases with observers (extended abstract). In Advances in Cryptology\u2014CRYPTO\u2019 92, pages 89\u2013105. Springer-Verlag, 1992.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"14_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0032362","volume-title":"Cryptography: Policy and Algorithms","author":"L. Chen","year":"1995","unstructured":"Lidong Chen. Access with pseudonyms. In Ed Dawson and Jovan Goli\u0107, editors, Cryptography: Policy and Algorithms, pages 232\u2013243. Springer-Verlag, 1995. Lecture Notes in Computer Science No. 1029."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup. A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology\u2014CRYPTO 98. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055717"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Ivan Bjerre Damg\u00e5rd. Payment systems and credential mechanisms with provable security against abuse by individuals (extended abstract). In Advances in Cryptology\u2014CRYPTO\u2019 88, pages 328\u2013335. Springer-Verlag, 1988.","DOI":"10.1007\/0-387-34799-2_26"},{"issue":"6","key":"14_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"C. Dwork, J. Lotspiech, and M. Naor. Digital signets: Self-enforcing protection of digital information. In Proceedings of the 28th STOC, pages 489\u2013498, 1996.","DOI":"10.1145\/237814.237997"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"E. Dyson. Release 2.1: A design for living in the digital age. Broadway, 1998.","DOI":"10.22230\/cjc.1999v24n2a1101"},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR19","unstructured":"Oded Goldreich. Secure multi-party computation. http:\/\/theory.lcs.mit.edu\/~oded, 1998."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pages 218\u2013229, 1987.","DOI":"10.1145\/28395.28420"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. Self-delegation with controlled propagation-or-what if you lose your laptop. In Advances in Cryptology\u2014CRYPTO 98, pages 153\u2013168. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055726"},{"key":"14_CR22","unstructured":"Shafi Goldwasser and Mihir Bellare. Lecture notes in cryptography. ftp:\/\/theory.lcs.mit.edu\/pub\/classes\/6.875\/crypto-notes.ps, 1996."},{"issue":"2","key":"14_CR23","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28(2):270\u2013299, April 1984.","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"14_CR24","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal on Computing"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Joe Kilian and Erez Petrank. Identity escrow. In Advances in Cryptology\u2014CRYPTO\u2019 98, pages 169\u2013185. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055727"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. Pseudonym systems. http:\/\/theory.lcs.mit.edu\/~anna\/lrsw99.ps, 1999.","DOI":"10.1007\/3-540-46513-8_14"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"David Mazi\u00e8res and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server. In Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998.","DOI":"10.1145\/288090.288098"},{"issue":"2","key":"14_CR28","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/BF00196774","volume":"4","author":"M. Naor","year":"1991","unstructured":"Moni Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151\u2013158, 1991.","journal-title":"Journal of Cryptology"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Tatsuaki Okamoto. Designated confirmer signatures and public-key encryption are equivalent. In Advances in Cryptology\u2014CRYPTO\u2019 94, pages 61\u201374. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48658-5_8"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"John Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pages 387\u2013394, 1990.","DOI":"10.1145\/100216.100269"},{"issue":"3","key":"14_CR31","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"V. Shoup. Lower bounds on discrete logarithms and related problems. In Advances in Cryptology\u2014EUROCRYPT\u2019 97, pages 256\u2013266. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"14_CR33","unstructured":"Michael Sipser. Introduction to the Theory of Computation. PWS Publishing Company, 1997."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46513-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:10:01Z","timestamp":1683997801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46513-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540671855","9783540465133"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-46513-8_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}