{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:04:09Z","timestamp":1725483849850},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540657576"},{"type":"electronic","value":"9783540489696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48969-x_7","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T14:06:54Z","timestamp":1178374014000},"page":"134-157","source":"Crossref","is-referenced-by-count":4,"title":["Signing Contracts and Paying Electronically"],"prefix":"10.1007","author":[{"given":"Torben P.","family":"Pedersen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,29]]},"reference":[{"key":"7_CR1","unstructured":"ISO\/IEC JTC 1\/SC27. Information technology-Security techniques-Digital signature schemes giving message recovery-Part 1: Mechanisms using redundancy. Final draft of ISO International Standard 9796-1, 1991"},{"key":"7_CR2","unstructured":"ISO\/IEC JTC 1\/SC27. Information technology-Security techniques-Non repudiation-Part 1: General Model. ISO International Standard 13888-1, 1997."},{"key":"7_CR3","unstructured":"ISO\/IEC JTC 1\/SC27. Information technology-Security techniques-Non repudiation-Part 3: Using asymmetric techniques. ISO International Standard 13888-3, 1997."},{"key":"7_CR4","unstructured":"ISO\/IEC JTC 1\/SC27. Information technology-Security techniques-Digital signatures with appendix-Part 3: Certificate-based mechanisms. Final draft of ISO International Standard 14888-3, 1998."},{"key":"7_CR5","unstructured":"ISO\/IEC JTC 1\/SC27. Information technology-Security techniques-Digital signatures with appendix-Part 1: General. Final draft of ISO International Standard 14888-1, 1998."},{"issue":"9","key":"7_CR6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/2.612244","volume":"30","author":"N. Asokan","year":"1997","unstructured":"N. Asokan, Phil Janson, Michael Steiner, and Michael Waidner. State of the art in electronic payment systems. IEEE Computer, 30(9):28\u201335, September 1997.","journal-title":"IEEE Computer"},{"key":"7_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-62494-5_4","volume-title":"Security Protocols","author":"R. Anderson","year":"1997","unstructured":"R. Anderson, C. Manifavas, and C. Sutherland. NetCard-A Practical Electronic-Cash System. In Security Protocols, Lecture Notes in Computer Science, pages 49\u201358. Springer-Verlag, 1997."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"N. Asokan, Matthias Schunter, and Michael Waidner. Optimistic Protocols for Fair Exchange. In 4th ACM Conference on Computer and Communications Security, pages 6\u201317. ACM Press, April 1997.","DOI":"10.1145\/266420.266426"},{"key":"7_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/BFb0054156","volume-title":"Advances in Cryptology-proceedings of EUROCRYPT 98","author":"N. Asokan","year":"1998","unstructured":"N. Asokan, Victor Shoup, and Michael Waidner. Optimistic Fair Exchange of Digital Signatures. In Advances in Cryptology-proceedings of EUROCRYPT 98, number 1403 in Lecture Notes in Computer Science, pages 591\u2013606, Berlin, 1998. Springer-Verlag."},{"key":"7_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Computer Security-ESORICS\u201994","author":"BBC+94_J.-P. Boly","year":"1994","unstructured":"[BBC+94]_J.-P. Boly, A. Bosselars, R. Cramer, R. Michelsen, S. Mj\u00f8lsnes, F. Muller, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vall\u00e9, and M. Waidner. The ESPRIT Project CAFE-High Security Digital Payment Systems. In Computer Security-ESORICS\u201994, volume 875 of Lecture Notes in Computer Science. Springer-Verlag, 1994."},{"key":"7_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-proceedings of CRYPTO 87","author":"E. Brickell","year":"1988","unstructured":"E. Brickell, D. Chaum, I. Damg\u00e5rd, and J van de Graaf. Gradual and Verifiable Release of a Secret. In Advances in Cryptology-proceedings of CRYPTO 87, Lecture Notes in Computer Science, Berlin, 1988. Springer-Verlag."},{"key":"7_CR12","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/147508.147537","volume":"39","author":"M. Bellare","year":"1992","unstructured":"M. Bellare and S. Micali. How to Sign given any Trapdoor Permutation. Journal of the Association for Computing Machinery, 39:214\u2013233, 1992.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"Ben-Or","year":"1990","unstructured":"Ben-Or, Goldreich, Micali, and Rivest. A Fair Protocol for Signing Contracts. IEEE trans. on Information Theory, 36:40\u201346, 1990.","journal-title":"IEEE trans. on Information Theory"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In First ACM Conference on Computer and Communications Security, 1993.","DOI":"10.1145\/168588.168596"},{"key":"7_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology-proceedings of CRYPTO 93","author":"S. Brands","year":"1994","unstructured":"S. Brands. Untraceable Off-line Cash in Wallet with Observers. In Advances in Cryptology-proceedings of CRYPTO 93, Lecture Notes in Computer Science, pages 302\u2013318. Springer-Verlag, 1994."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"S. Brands. Off-Line Electronic Cash Based on Secret-Key Certificates. In Proceedings of LATIN\u201995, 1995. Also available as CWI technical report, CS-R9506.","DOI":"10.1007\/3-540-59175-3_86"},{"key":"7_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology-proceedings of CRYPTO 88","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Advances in Cryptology-proceedings of CRYPTO 88, Lecture Notes in Computer Science, pages 319\u2013327. Springer-Verlag, 1990."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology-proceedings of CRYPTO 82, pages 199\u2013203, 1983.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"7_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/3-540-47555-9_32","volume-title":"Advances in Cryptology-proceedings of EURO CRYPT 92","author":"D. Chaum","year":"1993","unstructured":"D. Chaum and T. P. Pedersen. Transferred Cash Grows in Size. In Advances in Cryptology-proceedings of EURO CRYPT 92, Lecture Notes in Computer Science, pages 390\u2013407. Springer-Verlag, 1993."},{"key":"7_CR20","unstructured":"Cryptomathic. Mandate. See http:\/\/www.cryptomathic.dk . Describes a payment system based on electronic cheques."},{"key":"7_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-48285-7_17","volume-title":"Advances in Cryptology-proceedings of EURO-CRYPT 93","author":"I. Damg\u00e5rd","year":"1994","unstructured":"I. Damg\u00e5rd. Practical and Provably Secure Release of a Secret and Exchange of Signatures. In Advances in Cryptology-proceedings of EURO-CRYPT 93, number 765 in Lecture Notes in Computer Science, pages 200\u2013217, Berlin, 1994. Springer-Verlag."},{"key":"7_CR22","unstructured":"DEC. Milliscent. See http:\/\/www.millicent.digital.com ."},{"issue":"6","key":"7_CR23","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"7_CR24","unstructured":"Digital Signature Standard. Federal Information Processing Standards Publication 186, U.S. National Institute of Standards and Technology (NIST), February 1993. Draft."},{"key":"7_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology-proceedings of CRYPTO 84","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Advances in Cryptology-proceedings of CRYPTO 84, Lecture Notes in Computer Science, pages 10\u201318. Springer-Verlag, 1985."},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"7_CR27","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology-proceedings of EUROCRYPT 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology-proceedings of EUROCRYPT 86, Lecture Notes in Computer Science, pages 186\u2013194. Springer-Verlag, 1987."},{"key":"7_CR28","unstructured":"FSTC. Electronic check proposal. Technical report, Financial Services Technology Consortium, 1995."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen Message Attack. SI AM Journal on Computing, 17(2):281\u2013308, April 1988.","DOI":"10.1137\/0217017"},{"issue":"1","key":"7_CR30","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SI AM Journal of Computation, 18(1):186\u2013208, 1989.","journal-title":"SI AM Journal of Computation"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proceedings of the 27th IEEE Symposium on the Foundations of Computer Science, pages 174\u2013187, 1986.","DOI":"10.1109\/SFCS.1986.47"},{"key":"7_CR32","series-title":"Lect Notes Comput Sci","first-page":"123","volume-title":"Advances in Cryptology-proceedings of EUROCRYPT 88","author":"L. C. Guillou","year":"1989","unstructured":"L. C. Guillou and J.-J. Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In Advances in Cryptology-proceedings of EUROCRYPT 88, Lecture Notes in Computer Science, pages 123\u2013128. Springer-Verlag, 1989."},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"S. Haber and W.S. Stornetta. How To Time-Stamp a Digital Document. Journal of Cryptology, 3(2):99\u2013111, 1991.","journal-title":"Journal of Cryptology"},{"key":"7_CR34","unstructured":"R. Hauser, M. Steiner, and M. Waidner. Micro-Payments based on iKP. Technical Report RZ 2791, IBM Z\u00fcrich Research Laboratory, February 1996."},{"key":"7_CR35","unstructured":"IBM. See http:\/\/www.hrl.il.ibm.com\/mpay\/ ."},{"key":"7_CR36","unstructured":"Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT)-Application Level Syntax Rules, Part 9: Security Key and Certificate Management Message (KEYMAN). ISO\/DIS 9735-9."},{"key":"7_CR37","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-63594-7_77","volume-title":"Financial Cryptography","author":"S. Jarecki","year":"1997","unstructured":"S. Jarecki and A. M. Odlyzko. An efficient micropayment system based on probabilistic polling. In Financial Cryptography, Lecture Notes in Computer Science, pages 173\u2013191. Springer-Verlag, 1997."},{"key":"7_CR38","unstructured":"Mastercard and Visa. SET Secure Electronic Transactions Protocol, version 1.0 edition, May 1997. Book One: Business Specifications, Book Two: Technical Specification, Book Three: Formal Protocol Definition. Available from http:\/\/www.setco.org\/setspecifications.html ."},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In Proceedings of the 21st Annual ACM Symposium on the Theory of Computing, pages 33\u201343, 1989.","DOI":"10.1145\/73007.73011"},{"key":"7_CR40","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-62494-5_5","volume-title":"Security Protocols","author":"T. Pedersen","year":"1997","unstructured":"T. Pedersen. Electronic Payments of Small Amounts. In Security Protocols, Lecture Notes in Computer Science, pages 59\u201368. Springer-Verlag, 1997."},{"key":"7_CR41","unstructured":"Public-Key Infrastructure (X.509) (pkix). Internet Working Group. The task of the working group is to develop standards needed to support an X.509-based PKI."},{"key":"7_CR42","unstructured":"M. O. Rabin. Digitalized Signatures and Public-Key Functions as Intractable as factorization. Technical Report MIT\/LCS\/TR-212, Laboratory for Computer Science, MIT, January 1979."},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, 1990.","DOI":"10.1145\/100216.100269"},{"key":"7_CR44","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"Security Protocols","author":"R. Rivest","year":"1997","unstructured":"R. Rivest and A. Shamir. PayWord and MicroMint: Two Simple Micropayment Schemes. In Security Protocols, Lecture Notes in Computer Science, pages 69\u201388. Springer-Verlag, 1997."},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21, 1978.","DOI":"10.21236\/ADA606588"},{"key":"7_CR46","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology-proceedings of CRYPTO 89","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. In Advances in Cryptology-proceedings of CRYPTO 89, Lecture Notes in Computer Science, pages 239\u2013252. Springer-Verlag, 1990."},{"key":"7_CR47","unstructured":"Secure Hash Standard. Federal Information Processing Standards Publication 180-1, U.S. National Institute of Standards and Technology (NIST), April 1995."},{"issue":"6","key":"7_CR48","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"26","author":"H. C. Williams","year":"1980","unstructured":"H. C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transaction on Information Theory, 26(6):726\u2013729, 1980.","journal-title":"IEEE Transaction on Information Theory"},{"key":"7_CR49","unstructured":"Information technology-open systems interconnection-the directory: Authentication framework. ISO\/IEC 9594-8, 1995. See also Amendment 1 to ISO\/IEC 9594-8:1995-Certificate extensions."},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Y. Yeong, T. Howes, and S. Kille. Lightweight Directory Access Protocol. RFC 1777, March 1995.","DOI":"10.17487\/rfc1777"}],"container-title":["Lecture Notes in Computer Science","Lectures on Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48969-X_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T18:43:30Z","timestamp":1556390610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48969-X_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540657576","9783540489696"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/3-540-48969-x_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}