{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:01:44Z","timestamp":1775016104284,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_27","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:03:27Z","timestamp":1186830207000},"page":"324-337","source":"Crossref","is-referenced-by-count":155,"title":["Universal Electronic Cash"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"111","key":"27_CR1","doi-asserted-by":"publisher","first-page":"713","DOI":"10.2307\/2004849","volume":"24","author":"E.R. Berlekamp","year":"1970","unstructured":"E.R. Berlekamp, \u201cFactoring Polynomials over Large Finite Fields,\u201d Math. Comp., Vol.24, No.111, pp.713\u2013735 (1970)","journal-title":"Math. Comp."},{"key":"27_CR2","unstructured":"M. Blum, \u201cCoin flipping by telephone\u201d, IEEE, COMPCON, pp.133\u2013137 (1982)"},{"issue":"10","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum, \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete,\u201d Comm. of the ACM, 28,10, pp.1030\u20131044 (1985)","journal-title":"Comm. of the ACM"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat and M. Naor, \u201cUntraceable Electronic Cash,\u201d Proc. of Crypto\u201988, pp.319\u2013327 (1988)","DOI":"10.1007\/0-387-34799-2_25"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"J.L. Carter and M.N. Wegman, \u201cUniversal Classes of Hash Functions,\u201d Journal of Computer and System Sciences, 18, pp.143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"I.B. Damg\u00e5rd, \u201cPayment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals,\u201d Proc. of Crypto\u201988, pp.328\u2013335 (1988)","DOI":"10.1007\/0-387-34799-2_26"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, A. Lempel: \u201cA Randomized Protocol for Signing Contracts\u201d, Proc. of Crypto\u201982, pp.205\u2013210 (1982)","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, Y. Yacobi: \u201cElectronic Wallet\u201d, Proc. of Crypto\u201983, pp.383\u2013386 (1983)","DOI":"10.1007\/978-1-4684-4730-9_28"},{"key":"27_CR9","unstructured":"A. Fujioka, T. Okamoto, S. Miyaguchi: \u201cESIGN: An Efficient Digital Signature Implementation for Smart Cards\u201d, to appear in Proc. of Eurocrypt\u201991"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"B. Hayes, \u201cAnonymous One-Time Signatures and Flexible Untraceable Electronic Cash,\u201d Proc. of Auscrypt\u201990, pp.294\u2013305 (1990)","DOI":"10.1007\/BFb0030369"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"T. Okamoto, and K. Ohta \u201cDisposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash,\u201d Proc. of Crypto\u201989, pp.481\u2013496 (1989)","DOI":"10.1007\/0-387-34805-0_43"},{"key":"27_CR12","unstructured":"T. Okamoto, and K. Ohta \u201cDivertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducible,\u201d Proc. of Eurocrypt\u201989 (1989)"},{"key":"27_CR13","unstructured":"B. Pfitzmann, M. Waidner, \u201cHow to Break and Repair a \u201cProvably Secure\u201d Untraceable Payment System,\u201d to appear in Proc. of Crypto\u201991"},{"key":"27_CR14","unstructured":"M.O. Rabin, \u201cDigitalized Signatures and Public-Key Functions as Intractable as Factorization,\u201d Tech. Rep., MIT\/LCS\/TR-212, MIT Lab. Comp. Sci., (1979)"},{"issue":"6","key":"27_CR15","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"IT-26","author":"H.C. Williams","year":"1980","unstructured":"H.C. Williams, \u201cA Modification of the RSA Public-Key Encryption Procedure,\u201d IEEE Trans. on Information Theory, Vol.IT-26, No.6, pp.726\u2013729 (1980)","journal-title":"IEEE Trans. on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:48:42Z","timestamp":1619556522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_27","relation":{},"subject":[]}}