{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:54Z","timestamp":1725490254691},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_19","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:10:11Z","timestamp":1188313811000},"page":"253-268","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Improved Magic Ink Signatures Using Hints"],"prefix":"10.1007","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[]},{"given":"Joy","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"M. Abe, \u201cUniversally Verifiable Mix-net with Verification Work Independent of the Number of Mix-servers,\u201d Advances in Cryptology-Proceedings of Eurorypt\u2019 98, pp. 437\u2013447.","key":"19_CR1","DOI":"10.1007\/BFb0054144"},{"doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, \u201cRelations Among Notions of Security for Public-Key Encryption Schemes,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 98, pp. 26\u201345.","key":"19_CR2","DOI":"10.1007\/BFb0055718"},{"doi-asserted-by":"crossref","unstructured":"S. Brands, \u201cUntraceable Off-line Cash in Wallets with Observers,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 93, pp. 302\u2013318.","key":"19_CR3","DOI":"10.1007\/3-540-48329-2_26"},{"unstructured":"S. Brands, \u201cAn Efficient Off-line Electronic Cash Systems Based on the Representation Problem,\u201d C.W.I. Technical Report CS-T9323, The Netherlands.","key":"19_CR4"},{"unstructured":"E. Brickell, P. Gemmell and D. Kravitz, \u201cTrustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change,\u201d Proc. 6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1995, pp. 457\u2013466.","key":"19_CR5"},{"doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer and M. Stadler, \u201cDigital Payment Systems with Passive Anonymity-Revoking Trustees,\u201d Computer Security-ESORICS 96, volume 1146, pp. 33\u201343.","key":"19_CR6","DOI":"10.1007\/3-540-61770-1_26"},{"issue":"169","key":"19_CR7","first-page":"30","volume":"56","author":"National Institute for Standards and Technology, \u201cDigital Signature Standard (DSS)","year":"1991","unstructured":"National Institute for Standards and Technology, \u201cDigital Signature Standard (DSS), \u201d Federal Register Vol 56(169), Aug 30, 1991.","journal-title":"\u201d Federal Register Vol"},{"doi-asserted-by":"crossref","unstructured":"J. Camenisch, J-M. Piveteau and M. Stadler, \u201cAn Efficient Fair Payment System,\u201d Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996, pp. 88\u201394.","key":"19_CR8","DOI":"10.1145\/238168.238193"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat and M. Naor, \u201cUntraceable Electronic Cash,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 88, pp. 319\u2013327.","key":"19_CR9","DOI":"10.1007\/0-387-34799-2_25"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cUntraceable electronic mail, return addresses, and digital pseudonyms,\u201d Communications of the ACM, ACM 1981, pp. 84\u201388.","key":"19_CR10","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cBlind Signatures for Untraceable Payments,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 82, pp. 199\u2013203.","key":"19_CR11","DOI":"10.1007\/978-1-4757-0602-4_18"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, H. Van Antwerpen, \u201cUndeniable Signatures,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 89, pp. 212\u2013216.","key":"19_CR12","DOI":"10.1007\/0-387-34805-0_20"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cAchieving Electronic Privacy,\u201d Scientific American, August 1992, pp. 96\u2013101.","key":"19_CR13","DOI":"10.1038\/scientificamerican0892-96"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen, \u201cWallet databases with observers,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 92, pp. 89\u2013105.","key":"19_CR14","DOI":"10.1007\/3-540-48071-4_7"},{"doi-asserted-by":"crossref","unstructured":"G.I. Davida, Y. Frankel, Y. Tsiounis, and M. Yung, \u201cAnonymity Control in E-Cash Systems,\u201d Financial Cryptography 97, pp. 1\u201316.","key":"19_CR15","DOI":"10.1007\/3-540-63594-7_63"},{"doi-asserted-by":"crossref","unstructured":"T. ElGamal, \u201cA Public-Key Crytosystem and a Signature Scheme Based on the Discrete Logarithmus,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 84, pp. 10\u201318.","key":"19_CR16","DOI":"10.1007\/3-540-39568-7_2"},{"doi-asserted-by":"crossref","unstructured":"N. Ferguson, \u201cExtensions of Single-term Coins,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 93, pp. 292\u2013301.","key":"19_CR17","DOI":"10.1007\/3-540-48329-2_25"},{"doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung, \u201cIndirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash,\u201d Advances in Cryptology-Proceedings of Asiacrypt 96, pp. 286\u2013300.","key":"19_CR18","DOI":"10.1007\/BFb0034855"},{"key":"19_CR19","series-title":"Lect Notes Comput Sci","first-page":"33","volume-title":"Proceedings of 1996 Cambridge Workshop on Security Protocols","author":"E. Fujisaki","year":"1996","unstructured":"E. Fujisaki, T. Okamoto, \u201cPractical Escrow Cash System\u201d, LNCS 1189, Proceedings of 1996 Cambridge Workshop on Security Protocols, Springer Verlag, pp. 33\u201348."},{"doi-asserted-by":"crossref","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, \u201cRobust Threshold DSS Signatures\u201d, Advances in Cryptology-Proceedings of Eurocrypt\u2019 96, pp. 354\u2013371.","key":"19_CR20","DOI":"10.1007\/3-540-68339-9_31"},{"doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201cRevokable and Versatile Electronic Money,\u201d 3rd ACM Conference on Computer and Communications Security, 1996, pp. 76\u201387.","key":"19_CR21","DOI":"10.1145\/238168.238191"},{"unstructured":"M. Jakobsson, \u201cPrivacy vs Authenticity,\u201d PhD Thesis, University of California, San Diego,1997.","key":"19_CR22"},{"doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201cDistributed 'Magic Ink\u2019 Signatures,\u201d Advances in Cryptology-Proceedings of Eurocrypt\u2019 97, pp. 450\u2013464.","key":"19_CR23","DOI":"10.1007\/3-540-69053-0_31"},{"doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201cApplying Anti-Trust Policies to Increase Trust in a Versatile E-Money System,\u201d Advances in Cryptology-Proceedings of Financial Cryptography\u2019 97, pp. 217\u2013238.","key":"19_CR24","DOI":"10.1007\/3-540-63594-7_80"},{"doi-asserted-by":"crossref","unstructured":"M. Jakobsson, \u201cA Practical Mix,\u201d Advances in Cryptology-Proceedings of Eurocrypt\u2019 98, pp. 448\u2013461.","key":"19_CR25","DOI":"10.1007\/BFb0054145"},{"unstructured":"D. M\u2019Ra\u00efhi, \u201cCost-Effective Payment Schemes with Privacy Regulation,\u201d Advances in Cryptology-Proceedings of Asiacrypt\u2019 96.","key":"19_CR26"},{"doi-asserted-by":"crossref","unstructured":"W. Ogata, K. Kurosawa, K. Sako, K. Takatani, \u201cFault Tolerant Anonymous Channel,\u201d ICISC\u2019 97, pp. 440\u2013444.","key":"19_CR27","DOI":"10.1007\/BFb0028500"},{"doi-asserted-by":"crossref","unstructured":"T. Okamoto, \u201cAn Efficient Divisible Electronic Cash Scheme,\u201d Advances in Cryptology-Proceedings of Crypto\u2019 95, pp. 438\u2013451.","key":"19_CR28","DOI":"10.1007\/3-540-44750-4_35"},{"doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and M. Yung, \u201cHow to withstand mobile virus attacks,\u201d Proc. of the 10th ACM Symposium on the Principles of Distributed Computing, 1991, pp. 221\u2013242.","key":"19_CR29","DOI":"10.1145\/112600.112605"},{"doi-asserted-by":"crossref","unstructured":"T.P. Pedersen, \u201cDistributed Provers with Applications to Undeniable Signatures,\u201d Advances in Cryptology-Proceedings of Eurocrypt\u2019 91, pp. 221\u2013242.","key":"19_CR30","DOI":"10.1007\/3-540-46416-6_20"},{"key":"19_CR31","series-title":"LLNC","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0024619","volume-title":"Digital Signatures Schemes-General Framework and Fail-Stop Signatures","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, \u201cDigital Signatures Schemes-General Framework and Fail-Stop Signatures,\u201d LLNC 1100, Springer-Verlag, Berlin 1996"},{"unstructured":"C.P. Schnorr, \u201cEfficient Signature Generation for Smart Cards,\u201d Advances of Cryptology, Proceedings of Crypto\u2019 98, pp.239\u2013252.","key":"19_CR32"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"S. von Solms and D. Naccache, \u201cOn Blind Signatures and Perfect Crimes,\u201d Computers and Security, 11 (1992) pp. 581\u2013583.","journal-title":"Computers and Security"},{"unstructured":"M. Stadler, \u201cCryptographic Protocols for Revokable Privacy,\u201d PhD Thesis, ETH No. 11651, Swiss Federal Institute of Technology, Z\u00fcrich, 1996.","key":"19_CR34"},{"doi-asserted-by":"crossref","unstructured":"M. Stadler, J-M. Piveteau and J. Camenisch, \u201cFair Blind Signatures,\u201d Advances in Cryptology-Proceedings of Eurocrypt\u2019 95, pp. 209\u2013219.","key":"19_CR35","DOI":"10.1007\/3-540-49264-X_17"},{"unstructured":"Y. Tsiounis, \u201cEfficient Electronic Cash: New Notions and Techniques,\u201d PhD Thesis, College of Computer Science, Northeastern University, 1997. \n                    http:\/\/www.ccs.neu.edu\/home\/yiannis","key":"19_CR36"},{"unstructured":"B. Witter, \u201cThe Dark Side of Digital Cash,\u201d Legal Times, January 30, 1995.","key":"19_CR37"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:39:19Z","timestamp":1558276759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}