{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:46Z","timestamp":1725490246943},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_3","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:10:11Z","timestamp":1188313811000},"page":"29-45","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing"],"prefix":"10.1007","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"3_CR1","unstructured":"Digicash, Inc. Web site. http:\/\/www.DigiCash.com , 1998."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"D. Chaum Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology-CRYPTO\u2019 82, pages 199\u2013203.Plemum,1982.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"3_CR3","unstructured":"M. Jakobsson and M. Yung Revocable and versatile e-money. In 3rd ACM Conference on Computer Communications Security. ACM Press, 1996."},{"key":"3_CR4","series-title":"Lect Notes Comput Sci","first-page":"89","volume-title":"Advances in Cryptology-CRYPTO\u2019 92","author":"D. Chaum","year":"1992","unstructured":"D. Chaum and T. Pedersen Wallet databases with observers. In Ernest F. Brickell, editor, Advances in Cryptology-CRYPTO\u2019 92, pages 89\u2013105. Springer-Verlag, 1992. LNCS No. 740."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and A. Juels X-cash: Executable digital cash. In Rafael Hirschfeld, editor, Financial Cryptography\u2019 98. Springer-Verlag, 1998. To appear.","DOI":"10.1007\/BFb0055470"},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/3-540-69053-0_31","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 97","author":"M. Jakobsson","year":"1997","unstructured":"M. Jakobsson and M. Yung Distributed Magic-Ink signatures. In Walter Fumy, editor, Advances in Cryptology-EUROCRYPT\u2019 97, pages 450\u2013464. Springer-Verlag, 1997. LNCS No. 1233."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"M. Luby Pseudorandomness and Cryptographic Applications. Princeton University Press, 1996.","DOI":"10.1515\/9780691206844"},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/3-540-39118-5","volume-title":"Advances in Cryptology-CRYPTO\u2019 88","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, A. Fiat, and M. Naor Untraceable electronic cash. In Shafi Goldwasser, editor, Advances in Cryptology-CRYPTO\u2019 88, pages 319\u2013327. Springer-Verlag, 1988. LNCS No. 403."},{"key":"3_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BFb0055722","volume-title":"Advances in Cryptology-CRYPTO\u2019 98","author":"T. Rabin","year":"1998","unstructured":"T. Rabin A simplified approach to threshold and proactive RSA. In Hugo Krawczyk, editor, Advances in Cryptology-CRYPTO\u2019 98, pages 89\u2013104. Springer-Verlag, 1998. LNCS No. 1462."},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 95","author":"M. Stadler","year":"1995","unstructured":"M. Stadler, J.M. Piveteau, and J. Camenisch Fair blind signatures. In Louis C. Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology-EUROCRYPT\u2019 95, pages 209\u2013219. Springer-Verlag, 1995. LNCS No. 921."},{"key":"3_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"Advances in Cryptology-CRYPTO\u2019 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh and M. Franklin Efficient generation of shared RSA keys. In Burton S. Kaliski, Jr., editor, Advances in Cryptology-CRYPTO\u2019 97, pages 425\u2013439. Springer-Verlag, 1997. LNCS No. 1294."},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/BFb0034853","volume-title":"Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96","author":"D. MRa\u00efhi","year":"1996","unstructured":"D. M\u2019Ra\u00efhi Cost-effective payment schemes with privacy regulation. In M.Y. Rhee and K. Kim, editors, Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96, pages 266\u2013275. Springer-Verlag, 1996. LNCS No. 1163."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"B. Solms von","year":"1992","unstructured":"B. von Solms and D. Naccache On blind signatures and perfect crimes. Computers and Security, 11(6):581\u2013583, 1992.","journal-title":"Computers and Security"},{"key":"3_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0034852","volume-title":"Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96","author":"D. Pointcheval","year":"1996","unstructured":"D. Pointcheval and J. Stern Provably secure blind signature schemes. In M.Y. Rhee and K. Kim, editors, Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96, pages 252\u2013265. Springer-Verlag, 1996. LNCS No. 1163."},{"key":"3_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-49248-8_16","volume-title":"Computer Security and Industrial Cryptography: State of the Art and Evolution, ESAT Course","author":"B. Schoenmakers","year":"1998","unstructured":"B. Schoenmakers Basic security of the ecashTM payment system. In Bart Preenel et al., editors, Computer Security and Industrial Cryptography: State of the Art and Evolution, ESAT Course, pages 338\u2013352, 1998. LNCS No. 1528. Corrected version available on-line at http:\/\/www.win.tue.nl\/berry\/papers\/cosic.ps.gz ."},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/BFb0052233","volume-title":"Advances in Cryptology-CRYPTO\u2019 97","author":"A. Juels","year":"1997","unstructured":"A. Juels, M. Luby, and R. Ostrovsky Security of blind digital signatures. In Burton S. Kaliski, Jr., editor, Advances in Cryptology-CRYPTO\u2019 97, pages 150\u2013164. Springer-Verlag, 1997. LNCS No. 1294."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.-M. Piveteau, and M. Stadler An efficient fair payment system. In 3rd ACM Conference on Computer Communications Security, pages 88\u201394. ACM Press, 1996.","DOI":"10.1145\/238168.238193"},{"key":"3_CR18","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"3_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-62685-9","volume-title":"Financial Cryptography\u2019 97","author":"G. Davida","year":"1997","unstructured":"G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung Anonymity control in e-cash systems. In Rafael Hirschfeld, editor, Financial Cryptography\u2019 97, pages 1\u201316. Springer-Verlag, 1997. LNCS No. 1318."},{"key":"3_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68697-5_1","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk Keying hash functions for message authentication. In Neal Koblitz, editor, Advances in Cryptology-CRYPTO\u2019 96, pages 1\u201316. Springer-Verlag, 1996. LNCS No. 1109."},{"key":"3_CR21","unstructured":"E.F. Brickell, P. Gemmell, and D. Kravitz Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457\u2013466, 1995."},{"key":"3_CR22","unstructured":"L. Law, S. Sabett, and J. Solinas How to make a mint: the cryptography of anonymous digital cash. Technical Report 96-10-17, National Security Agency, 1996. Available at http:\/\/www.ffhsj.com\/bancmail\/bancpage.html ."},{"key":"3_CR23","series-title":"Lect Notes Comput Sci","first-page":"31","volume-title":"Computer Security-ESORICS\u2019 96","author":"J. Camenisch","year":"1996","unstructured":"J. Camenisch, U. Maurer, and M. Stadler Digital payment systems with passive anonymity-revoking trustees. In Computer Security-ESORICS\u2019 96, pages 31\u201343. Springer-Verlag, 1996. LNCS No.1146."},{"issue":"1","key":"3_CR24","doi-asserted-by":"crossref","first-page":"254","DOI":"10.3233\/JCS-1997-5104","volume":"5","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch, U. Maurer, and M. Stadler Digital payment systems with passive anonymity-revoking trustees. Journal of Computer Security, 5(1):254\u2013265, 1997.","journal-title":"Journal of Computer Security"},{"key":"3_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/BFb0034855","volume-title":"Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96","author":"Y. Frankel","year":"1996","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung Indirect discourse proofs: Achieving fair off-line e-cash. In M.Y. Rhee and K. Kim, editors, Advances in Cryptology-Proceedings of ASIACRYPT\u2019 96, pages 286\u2013300. Springer-Verlag, 1996. LNCS No.1163."},{"key":"3_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/3-540-63594-7_80","volume-title":"Financial Cryptography\u2019 97","author":"M. Jakobsson","year":"1997","unstructured":"M. Jakobsson and M. Yung Applying anti-trust policies to increase trust in a versatile e-money system. In Rafael Hirschfeld, editor, Financial Cryptography\u2019 97, pages 217\u2013238. Springer-Verlag, 1997. LNCS No. 1318."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"D. M\u2019Ra\u00efhi and D. Pointcheval Distributed trustees and revokability: A framework for internet payment. In Rafael Hirschfeld, editor, Financial Cryptography\u2019 98. Springer-Verlag, 1998. To appear.","DOI":"10.1007\/BFb0055471"},{"key":"3_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"Advances in Cryptology-CRYPTO\u2019 95","author":"M. Bellare","year":"1995","unstructured":"M. Bellare, R. Guerin, and P. Rogaway XOR MACs: New methods for message authentication using finite pseudo-random functions. In Don Coppersmith, editor, Advances in Cryptology-CRYPTO\u2019 95, pages 15\u201328. Springer-Verlag, 1995. LNCS No. 963."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T05:15:31Z","timestamp":1587878131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}