{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:33:31Z","timestamp":1743032011105,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666950"},{"type":"electronic","value":"9783540477907"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-47790-x_20","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:07:18Z","timestamp":1186614438000},"page":"235-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Undeniable Confirmer Signature"],"prefix":"10.1007","author":[{"given":"Khanh","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[1999,10,22]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cRandom Oracles are practical: a paradigm for designing efficient protocols\u201d, Proc. 1st ACM Conference on Computer and Communications Security, ACM Press, 1993, pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"J. Boyar, D. Chaum, I. Damg\u00e5ar and T. Pedersen, \u201cConvertible undeniable signatures\u201d, Proc. of Crypto\u201990, Springer-Verlag, 1991, pp. 189\u2013205.","DOI":"10.1007\/3-540-38424-3_14"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Stadler, \u201cEfficient group signature schemes for large groups\u201d, Proc. of Crypto\u201997, Springer-Verlag 1997, pp. 410\u2013424.","DOI":"10.1007\/BFb0052252"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"D. Chaum and H. van Antwerpen, \u201cUndeniable signatures\u201d, Proceedings of Crypto\u201989, Springer-Verlag, 1990, pp. 212\u2013216.","DOI":"10.1007\/0-387-34805-0_20"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cZero-knowledge undeniable signatures\u201d, Proceedings of Eurocrypt\u201990, Springer-Verlag, 1991, pp. 458\u2013464.","DOI":"10.1007\/3-540-46877-3_41"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cDesignated confirmer signatures\u201d, Proc. of Eurocrypt\u201994, Springer-Verlag, 1995, pp.86\u201391.","DOI":"10.1007\/BFb0053427"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen, \u201cWallet databases with observers\u201d, Proc. of Crypto\u201992, Springer-Verlag, 1993, pp. 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"L. Chen, \u201cEfficient fair exchange with verifiable confirmation of signature\u201d in Proceedings of Asiacrypt\u201998, Springer-Verlag, 1998, pp. 286\u2013298.","DOI":"10.1007\/3-540-49649-1_23"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd and T. Pedersen, \u201cNew convertible undeniable signature schemes\u201d, Proceedings of Eurocrypt\u201996, Springer-Verlag, 1996, pp. 372\u2013386.","DOI":"10.1007\/3-540-68339-9_32"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"A. Fujioka, T. Okamoto and K. Ohta, \u201cInteractive bi-proof systems and undeniable signature schemes\u201d, Proc. of Eurocrypt\u201991, Springer-Verlag, 1992, pp. 243\u2013256.","DOI":"10.1007\/3-540-46416-6_21"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"R. Gennaro, H. Krawczyk and T. Rabin, \u201cRSA-based undeniable signatures\u201d, Proc. of Crypto\u201997, Springer-Verlag, 1997, pp. 132\u2013149.","DOI":"10.1007\/BFb0052232"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali and A. Wigderson, \u201cProofs that yield nothing but their validity and a methodology of cryptographic protocol design\u201d, Proceedings of IEEE 27th Annual Symposium on Foundations of Computer Science, pp. 174\u2013187, 1986.","DOI":"10.1109\/SFCS.1986.47"},{"issue":"2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest, \u201cA digital signature scheme secure against adaptive chosen-message attacks\u201d, SIAM J. Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM J. Computing"},{"key":"20_CR14","unstructured":"M. Michels and M. Stadler, \u201cEfficient convertible undeniable signature schemes\u201d, Proc. of 4th Annual Workshop on Selected Areas in Cryptology(SAC\u201997), 1997, pp. 231\u2013243."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"M. Michels and M. Stadler, \u201cGeneric constructions for secure and efficient confirmer signature Schemes\u201d, Proceedings of Eurocrypt\u201998, Springer-Verlag, 1998, pp.405\u2013421.","DOI":"10.1007\/BFb0054142"},{"key":"20_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-48658-5_8","volume-title":"Proceedings of Crypto\u201994","author":"T. Okamoto","year":"1994","unstructured":"T. Okamoto, \u201cDesignated confirmer signatures and public key encryption\u201d, Proceedings of Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 61\u201374."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, \u201cDivertible zero-knowledge interactive proofs and commutative random self-reducibility\u201d, Proceedings of Eurocrypt\u201989, Springer-Verlag, 1990, pp. 134\u2013149.","DOI":"10.1007\/3-540-46885-4_16"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity proofs for signature schemes\u201d, Proceedings of Eurocrypt\u201996, Springer-Verlag, 1996, pp. 387\u2013398.","DOI":"10.1007\/3-540-68339-9_33"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"C. Rackoff and D. Simon, \u201cNon-interactive zero-knowledge proof of knowledge and chosen ciphertext attack\u201d, Proceedings of Crypto\u201991, Springer-Verlag, 1991, pp. 433\u2013444.","DOI":"10.1007\/3-540-46766-1_35"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"C. Schnorr, \u201cEfficient identification and signatures for smart cards\u201d, Proc. of Crypto\u201989, Springer-Verlag, 1990, pp. 239\u2013252.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"20_CR21","volume-title":"Cryptographic Protocols for Revocable Privacy","author":"M. Stadler","year":"1996","unstructured":"M. Stadler, \u201cCryptographic Protocols for Revocable Privacy\u201d, Ph.D Thesis, Swiss Federal Institute of Technology, Zurich, 1996."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47790-X_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T17:12:18Z","timestamp":1585933938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47790-X_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666950","9783540477907"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-47790-x_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"22 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}