{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:40:01Z","timestamp":1767858001738,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540665311","type":"print"},{"value":"9783540481690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48169-9_11","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T05:36:33Z","timestamp":1194240993000},"page":"151-166","source":"Crossref","is-referenced-by-count":35,"title":["Abuse-Free Multi-party Contract Signing"],"prefix":"10.1007","author":[{"given":"Juan A.","family":"Garay","sequence":"first","affiliation":[]},{"given":"Philip","family":"MacKenzie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,3]]},"reference":[{"key":"11_CR1","unstructured":"N. Asokan, B. Baum-Waidner, M. Schunter, and M. Waidner. Optimistic synchronous multi-party contract signing. IBM Research Report RZ3089, 1998."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In ACM Conf. on Computer and Comm. Security\u2019 97, pp. 6\u201317.","DOI":"10.1145\/266420.266426"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In IEEE Symp. on Research in Security and Privacy, pp. 86\u201399, 1998.","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"N. Asokan, V. Shoup, and M. Waidner. Fair exchange of digital signatures. In EUROCRYPT\u2019 98, pp. 591\u2013606.","DOI":"10.1007\/BFb0054156"},{"key":"11_CR5","unstructured":"B. Baum-Waidner and M. Waidner. Optimistic asynchronous multi-party contract signing. IBM Research Report RZ3078, 1998."},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/357360.357368","volume":"1","author":"M. Blum","year":"1983","unstructured":"M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175\u2013193, May 1983.","journal-title":"ACM Transactions on Computer Systems"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"M. Blum. Coin flipping by telephone: A protocol for solving impossible problems. In CRYPTO 81, pp. 11\u201315.","DOI":"10.1145\/1008908.1008911"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H. B\u00fcrk","year":"1990","unstructured":"H. B\u00fcrk and A. Pfitzmann. Value exchange systems enabling security and unobservability. Computers and Security, 9:715\u2013721, 1990.","journal-title":"Computers and Security"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"D. Chaum. Blind signatures for untraceable payments. In CRYPTO 82, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"D. Chaum. Designated confirmer signatures. In EUROCRYPT 94, pp. 86\u201391.","DOI":"10.1007\/BFb0053427"},{"key":"11_CR11","unstructured":"B. Cox, J. D. Tygar, and M. Sirbu. Netbill security and transaction protocol. In First USENIX Workshop on Electronic Commerce, pp. 77\u201388, 1995."},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00191356","volume":"8","author":"I. Damg\u00e5rd","year":"1995","unstructured":"I. Damg\u00e5rd. Practical and provably secure release of a secret and exchange of signatures. J. of Cryptology, 8(4):201\u2013222, Autumn 1995.","journal-title":"J. of Cryptology"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"R. Deng, L. Gong, A. Lazar, and W. Wang. Practical protocols for certified electronic mail. J. of Network and Systems Management, 4(3), 1996.","DOI":"10.1007\/BF02139147"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1008908.1008913","volume":"15","author":"S. Even","year":"1983","unstructured":"S. Even. A protocol for signing contracts. ACM SIGACT News, 15(1):34\u201339, 1983.","journal-title":"ACM SIGACT News"},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637\u2013647, June 1985.","journal-title":"Communications of the ACM"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed commit with one faulty process. Journal of the ACM, 32(2), 1985.","DOI":"10.1145\/3149.214121"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Reiter. Fair exchange with a semi-trusted third party. In ACM Conf. on Computer and Comm. Security\u2019 97, pp.1\u20135.","DOI":"10.1145\/266420.266424"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"J. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. To appear in CRYPTO 99, August 1999.","DOI":"10.1007\/3-540-48405-1_29"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"O. Goldreich. A simple protocol for signing contracts. In CRYPTO 83, pp. 133\u2013136.","DOI":"10.1007\/978-1-4684-4730-9_11"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT 96, pp. 143\u2013154.","DOI":"10.1007\/3-540-68339-9_13"},{"key":"11_CR21","unstructured":"S. Micali. Certified e-mail with invisible post offices. Presented at the 1997 RSA Security Conference, 1997."},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228\u2013234, 1980.","journal-title":"Journal of the ACM"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann, M. Schunter, and M. Waidner. Optimal efficiency of optimistic contract signing. In PODC\u2019 98, pp. 113\u2013122.","DOI":"10.1145\/277697.277717"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO\u201989, pp. 239\u2013252.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"11_CR25","unstructured":"A. Silberschatz, H. Korth, and S. Sudarshan. Database System Concepts. McGraw-Hill, 1997."},{"key":"11_CR26","unstructured":"M. Waidner. Personal communication."}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48169-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:00:31Z","timestamp":1737514831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48169-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540665311","9783540481690"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-48169-9_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}