{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T11:38:21Z","timestamp":1776425901449,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540577669","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_26","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"302-318","source":"Crossref","is-referenced-by-count":311,"title":["Untraceable Off-line Cash in Wallet with Observers"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Brands","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, Micali, \u201cHow To Sign Given Any Trapdoor Function,\u201d Proceedings of Crypto\u2019 88, Springer-Verlag, pages 200\u2013215.","DOI":"10.1007\/0-387-34799-2_15"},{"key":"26_CR2","unstructured":"Brands, S., \u201cAn Efficient Off-line Electronic Cash System Based On The Representation Problem,\u201d CWI Technical Report CS-R9323, April 11, 1993."},{"key":"26_CR3","unstructured":"Brands, S., \u201cUntraceable Off-Line Cash Based On The Representation Problem,\u201d manuscript. To be published as a CWI Technical Report in Januari\/Februari 1994."},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. Brickell","year":"1992","unstructured":"Brickell, E. and McCurley, K., \u201cAn Interactive Identification Scheme Based On Discrete Logarithms And Factoring,\u201d Journal of Cryptology, Vol. 5 no. 1 (1992), pages 29\u201339.","journal-title":"Journal of Cryptology"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D., \u201cAchieving Electronic Privacy,\u201d Scientific American, August 1992, pages 96\u2013101.","DOI":"10.1038\/scientificamerican0892-96"},{"issue":"10","key":"26_CR6","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D., \u201cSecurity Without Identification: Transaction Systems To Make Big Brother Obsolete,\u201d Communications of the ACM, Vol. 28 no. 10, October 1985, pages 1020\u20131044.","journal-title":"Communications of the ACM"},{"key":"26_CR7","unstructured":"Chaum, D., \u201cCard-computer moderated systems,\u201d (unpublished), 1989."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Chaum, D., Fiat, A. and Naor, M., \u201cUntraceable Electronic Cash,\u201d Proceedings of Crypto\u2019 88, Springer-Verlag, pages 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"26_CR9","unstructured":"Chaum, D. and Pedersen, T., \u201cWallet Databases With Observers,\u201d Preproceedings of Crypto\u2019 92."},{"key":"26_CR10","unstructured":"Cramer, R. and Pedersen, T., \u201cImproved Privacy In Wallets With Observers\u2019, Preproceedings of EuroCrypt\u2019 93."},{"key":"26_CR11","unstructured":"Ferguson, N., \u201cSingle Term Off-Line Coins\u201d, Preproceedings of EuroCrypt\u2019 93."},{"key":"26_CR12","unstructured":"Ferguson, N., \u201cExtensions Of Single-Term Off-Line coins,\u201d these proceedings."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Fiat, A. and Shamir, A., \u201cHow To Prove Yourself: Practical Solutions To Identification And Signature Problems,\u201d Proceedings of Crypto\u2019 86, Springer-Verlag, pages 186\u2013194.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"26_CR14","unstructured":"Okamoto, T., \u201cProvably Secure And Practical Identification Schemes And Corresponding Signature Schemes,\u201d Preproceedings of Crypto\u2019 92."},{"issue":"3","key":"26_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P., \u201cEfficient Signature Generation By Smart Cards,\u201d Journal of Cryptology, Vol. 4 no. 3 (1991), pages 161\u2013174.","journal-title":"Journal of Cryptology"},{"key":"26_CR16","unstructured":"\u201cNo Hiding Place \/ Big Brother Is Clocking You,\u201d The Economist, August 7th\u201313th 1993."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:36Z","timestamp":1605647736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_26","relation":{},"subject":[]}}