{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:23:51Z","timestamp":1778297031578,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540663621","type":"print"},{"value":"9783540483908","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_15","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T11:10:11Z","timestamp":1188299411000},"page":"196-211","source":"Crossref","is-referenced-by-count":98,"title":["Some Open Issues and New Directions in Group Signatures"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"15_CR1","unstructured":"C. Boyd Digital Multi-signatures. Cryptography and Coding (H.J. Beker and F.C. Piper Eds.), Oxford University Press, 1989, pp 241\u2013246."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"M. Burmester and Y. Desmedt A secure and e_cient conference key distribution system. In Advances in Cryptology-EUROCRYPT, 1994.","DOI":"10.1007\/BFb0053443"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"J. Camenisch Efficient and generalized group signatures. In Advances in Cryptology-EUROCRYPT, 1997.","DOI":"10.1007\/3-540-69053-0_32"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Stadler Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO, 1997.","DOI":"10.1007\/BFb0052252"},{"key":"15_CR5","unstructured":"D. Chaum and T. Pedersen Wallet databases with observers. In Advances in Cryptology-CRYPTO, 1992."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum and E. van Heyst Group signatures. In Advances in Cryptology-EUROCRYPT, 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"L. Chen and T. Pedersen On the efficiency of group signatures providing information-theoretic anonymity. In Advances in Cryptology-EUROCRYPT, 1995.","DOI":"10.1007\/3-540-49264-X_4"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"A. Lysyanskaya and Z. Ramzan Group blind digital signatures. In Financial Cryptography Conference, 1998.","DOI":"10.1007\/BFb0055483"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"H. Petersen How to convert any digital signature scheme into a group signature scheme. In Security Protocols Workshop, 1997.","DOI":"10.1007\/BFb0028168"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, and M. Waidner Diffie-hellman key distribution extended to groups. In ACM Conference on Computer and Communication Security, pages 31\u201337, March 1996.","DOI":"10.1145\/238168.238182"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:12:39Z","timestamp":1556802759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}