{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:32:07Z","timestamp":1725489127972},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_28","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"338-350","source":"Crossref","is-referenced-by-count":31,"title":["How to Break and Repair a \u201cProvably Secure\u201d Untraceable Payment System"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","first-page":"32","volume-title":"20th Symposium on Theory of Computing (STOC) 1988","author":"88","year":"1988","unstructured":"88 Mihir Bellare, Silvio Micali: How to sign given any trapdoor function; 20th Symposium on Theory of Computing (STOC) 1988, ACM, New York 1988, 32\u201342."},{"key":"28_CR2","series-title":"Lect Notes Comput Sci","first-page":"441","volume-title":"Eurocrypt\u2019 90","author":"91","year":"1991","unstructured":"91 Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme where Forgery can be Proved; Eurocrypt\u2019 90, LNCS 473, Springer-Verlag, Berlin 1991, 441\u2013445."},{"issue":"5","key":"28_CR3","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/0167-4048(89)90022-9","volume":"8\/","author":"89","year":"1989","unstructured":"89 Holger B\u00fcrk, Andreas Pfitzmann: Digital Payment Systems Enabling Security and Unobservability; Computers & Security 8\/5 (1989) 399\u2013416.","journal-title":"Computers & Security"},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","first-page":"294","volume-title":"Eurocrypt\u2019 89","author":"90","year":"1990","unstructured":"90 David Chaum, Bert den Boer, Eug\u00e8ne van Heijst, Stig Mj\u00f8lsnes, Adri Steenbeek: Efficient offline electronic checks; Eurocrypt\u2019 89, LNCS 434, Springer-Verlag, Berlin 1990, 294\u2013301."},{"issue":"2","key":"28_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24\/","author":"81","year":"1981","unstructured":"81 David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24\/2 (1981) 84\u201388.","journal-title":"Communications of the ACM"},{"key":"28_CR6","first-page":"199","volume-title":"Crypto\u2019 82","author":"83","year":"1983","unstructured":"83 David Chaum: Blind Signatures for untraceable payments; Crypto\u2019 82, Plenum Press, New York 1983, 199\u2013203."},{"issue":"10","key":"28_CR7","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28\/","author":"85","year":"1985","unstructured":"85 David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28\/10 (1985) 1030\u20131044.","journal-title":"Communications of the ACM"},{"issue":"1","key":"28_CR8","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1\/","author":"88","year":"1988","unstructured":"88 David Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability; Journal of Cryptology 1\/1 (1988) 65\u201375.","journal-title":"Journal of Cryptology"},{"key":"28_CR9","first-page":"69","volume-title":"SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 International Conference","author":"89","year":"1989","unstructured":"89 David Chaum: Privacy Protected Payments \u2014 Unconditional Payer and\/or Payee Untraceability; SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 International Conference; North-Holland, Amsterdam 1989, 69\u201393."},{"key":"28_CR10","series-title":"Lect Notes Comput Sci","first-page":"246","volume-title":"Auscrypt\u2019 90","author":"90","year":"1990","unstructured":"90 David Chaum: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt\u2019 90, LNCS 453, Springer-Verlag, Berlin 1990, 246\u2013264."},{"key":"28_CR11","series-title":"Lect Notes Comput Sci","first-page":"288","volume-title":"Eurocrypt\u2019 89","author":"90","year":"1990","unstructured":"90 David Chaum: Online cash checks; Eurocrypt\u2019 89, LNCS 434, Springer-Verlag, Berlin 1990, 288\u2013293."},{"key":"28_CR12","series-title":"Lect Notes Comput Sci","first-page":"87","volume-title":"Crypto\u2019 87","author":"88","year":"1988","unstructured":"88 David Chaum, Ivan Bjerre Damg\u00e5rd, Jeroen van de Graaf: Multiparty Computations ensuring privacy of each party\u2019s input and correctness of the result; Crypto\u2019 87, LNCS 293, Springer-Verlag, Berlin 1988, 87\u2013119."},{"key":"28_CR13","series-title":"Lect Notes Comput Sci","first-page":"118","volume-title":"Crypto\u2019 86","author":"87","year":"1987","unstructured":"87 David Chaum, Jan-Hendrik Evertse: A secure and privacy-protecting protocol for transmitting personal information between organizations; Crypto\u2019 86, LNCS 263, Springer-Verlag, Berlin 1987, 118\u2013167."},{"key":"28_CR14","series-title":"Lect Notes Comput Sci","first-page":"319","volume-title":"Crypto\u2019 88","author":"90","year":"1990","unstructured":"90 David Chaum, Amos Fiat, Moni Naor: Untraceable Electronic Cash; Crypto\u2019 88, LNCS 403, Springer-Verlag, Berlin 1990, 319\u2013327."},{"key":"28_CR15","unstructured":"90 David Chaum, Sandra Roijakkers: Unconditionally Secure Digital Signatures; Crypto\u2019 90, 11\u201315 August 1990, Abstracts, 209\u2013217."},{"key":"28_CR16","series-title":"Lect Notes Comput Sci","first-page":"328","volume-title":"Crypto\u2019 88","author":"90","year":"1990","unstructured":"90 Ivan Bjerre Damg\u00e5rd: Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals; Crypto\u2019 88, LNCS 403, Springer-Verlag, Berlin 1990, 328\u2013335."},{"key":"28_CR17","unstructured":"91 Ivan Bjerre Damg\u00e5rd: Private communication, Brighton, April 10th 1991."},{"key":"28_CR18","series-title":"Lect Notes Comput Sci","first-page":"104","volume-title":"Crypto\u2019 86","author":"87","year":"1987","unstructured":"87 Oded Goldreich: Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme; Crypto\u2019 86, LNCS 263, Springer-Verlag, Berlin 1987, 104\u2013110."},{"issue":"2","key":"28_CR19","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17\/","author":"88","year":"1988","unstructured":"88 Shafi Goldwasser, Silvio Micali, Ronald L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks; SIAM J. Comput. 17\/2 (1988) 281\u2013308.","journal-title":"SIAM J. Comput."},{"key":"28_CR20","first-page":"33","volume-title":"21st STOC","author":"89","year":"1989","unstructured":"89 Moni Naor, Moti Yung: Universal One-way Hash Functions and their Cryptographic Applications; 21st STOC, ACM, New York 1989, 33\u201343."},{"key":"28_CR21","series-title":"Lect Notes Comput Sci","first-page":"134","volume-title":"Eurocrypt\u2019 89","author":"90","year":"1990","unstructured":"90 Tatsuaki Okamoto, Kazuo Ohta: Divertible zero-knowledge interactive proofs and commutative random self-reducibility; Eurocrypt\u2019 89, LNCS 434, Springer-Verlag, Berlin 1990, 134\u2013149."},{"key":"28_CR22","series-title":"Lect Notes Comput Sci","first-page":"481","volume-title":"Crypto\u2019 89","author":"90","year":"1990","unstructured":"90 Tatsuaki Okamoto, Kazuo Ohta: Disposable zero-knowledege authentications and their applications to untraceable electronic cash; Crypto\u2019 89, LNCS 435, Springer-Verlag, Heidelberg 1990, 481\u2013496."},{"key":"28_CR23","unstructured":"91 Tatsuaki Okamoto, Kazuo Ohta: Universal Electronic Cash; Crypto\u2019 91, Santa Barbara, CA, 11.\u201315. August 1991, Abstracts, 8.7\u20138.13."},{"key":"28_CR24","unstructured":"91 Birgit Pfitzmann, Michael Waidner: Fail-stop Signatures and their Application; Securicom 91, Paris 1991, 145\u2013160."},{"issue":"101112","key":"28_CR25","first-page":"712","volume":"3\/","author":"87","year":"1987","unstructured":"87 Birgit Pfitzmann, Michael Waidner, Andreas Pfitzmann: Rechtssicherheit trotz Anonymit\u00e4t in offenen digitalen Systemen; Computer und Recht 3\/10,11,12 (1987) 712\u2013717, 796\u2013803, 898\u2013904; Revision: DuD 14\/5\u20136 (1990) 243\u2013253, 305\u2013315.","journal-title":"Computer und Recht"},{"key":"28_CR26","first-page":"128","volume-title":"Proc. Datenschutz und Datensicherung im Wandel der Informationstechnologien, IFB 113","author":"85","year":"1985","unstructured":"85 Michael Waidner, Andreas Pfitzmann: Betrugssicherheit trotz Anonymit\u00e4t. Abrechnung und Geldtransfer in Netzen; Proc. Datenschutz und Datensicherung im Wandel der Informationstechnologien, IFB 113, Springer-Verlag, Berlin 1985, 128\u2013141; Revision: DuD\/1 (1986) 16\u201322."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:31Z","timestamp":1605647611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_28","relation":{},"subject":[]}}