{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T16:55:20Z","timestamp":1763225720749},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_21","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"248-259","source":"Crossref","is-referenced-by-count":125,"title":["Efficient Anonymous Channel and All\/Nothing Election Scheme"],"prefix":"10.1007","author":[{"given":"Choonsik","family":"Park","sequence":"first","affiliation":[]},{"given":"Kazutomo","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Kurosawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"21_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, Vol. 24, No.2, (1981), 84\u201388","journal-title":"Communications of the ACM"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. Advance in Cryptology \u2014 EUROCRYPT\u201989, (1989), 177\u2013182","DOI":"10.1007\/3-540-45961-8_15"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D.L. Chaum","year":"1988","unstructured":"Chaum, D.L.: The Dining Cryptographers Problem: Unconditional sender and Recipient Untraceability. Journal of Cryptology, Vol.1, No.1, (1988), 65\u201375","journal-title":"Journal of Cryptology"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Benaloh, J.C.: Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret. Advance in Cryptology \u2014 CRYPTO\u201986, (1986), 251\u2013260","DOI":"10.1007\/3-540-47721-7_19"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. Advance in Cryptology \u2014 CRYPTO\u201989, (1990), 307\u2013315","DOI":"10.1007\/0-387-34805-0_28"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:25Z","timestamp":1619571025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_21","relation":{},"subject":[]}}