{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:20:47Z","timestamp":1725488447665},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540594093"},{"type":"electronic","value":"9783540492641"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-49264-x_4","type":"book-chapter","created":{"date-parts":[[2007,8,7]],"date-time":"2007-08-07T06:52:09Z","timestamp":1186469529000},"page":"39-49","source":"Crossref","is-referenced-by-count":12,"title":["On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity"],"prefix":"10.1007","author":[{"given":"Lidong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Torben P.","family":"Pedersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"4_CR1","unstructured":"C. Boyd. Digital Multisignatures. In Cryptography and Coding, pages 241\u2013246, 1989."},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology-proceedings of EUROCRYPT 91","author":"D. Chaum","year":"1991","unstructured":"D. Chaum and E. van Heijst. Group Signatures. In Advances in Cryptology-proceedings of EUROCRYPT 91, Lecture Notes in Computer Science #547, pages 257\u2013265. Springer-Verlag, 1991."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-38424-3_15","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 90","author":"D. Chaum","year":"1991","unstructured":"D. Chaum and S. Roijakkers Unconditionally Secure Digital Signatures In Advances in Cryptology \u2014 proceedings of CRYPTO 90. Lecture Notes in Computer Science #537, pages 206\u2013214, 1991."},{"key":"4_CR4","unstructured":"L. Chen and T. P. Pedersen New Group Signature Schemes. In Advances in Cryptology \u2014 Proceedings of Eurocrypt\u2019 94."},{"key":"4_CR5","unstructured":"L. Chen and T.P. Pedersen. Group Signatures: Unconditional Security for Members. Technical Report DAIMI PB-481, Aarhus University, September 1994."},{"key":"4_CR6","unstructured":"R. A. Croft and S. P. Harris. Public-Key Cryptography and Reusable Shared Secrets. In Cryptography and Coding, pages 189\u2013201, 1989."},{"key":"4_CR7","series-title":"Lect Notes Comput Sci","first-page":"3","volume-title":"Advances in Cryptology \u2014 proceedings of AUSCRYPT 92","author":"Y. Desmedt","year":"1993","unstructured":"Y. Desmedt. Threshold Cryptosystems. In Advances in Cryptology \u2014 proceedings of AUSCRYPT 92, Lecture Notes in Computer Science #718, pages 3\u201314, 1993."},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack. SIAM Journal of Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal of Computation, 18(1):186\u2013208, 1989.","journal-title":"SIAM Journal of Computation"},{"key":"4_CR10","unstructured":"E. van Heijst. Special Signature Schemes. PhD thesis, CWI, 1992."},{"issue":"8","key":"4_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T. Okamoto","year":"1988","unstructured":"T. Okamoto. A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystems. ACM Trans. on Comp. Sys., 6(8):432\u2013441, 1988.","journal-title":"ACM Trans. on Comp. Sys."},{"key":"4_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-57332-1_11","volume-title":"Advances in Cryptology \u2014 proceedings of ASI ACRYPT 91","author":"K. Ohta","year":"1993","unstructured":"K. Ohta and T. Okamoto. A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. In Advances in Cryptology \u2014 proceedings of ASI ACRYPT 91, Lecture Notes in Computer Science #739, pages 139\u2013148. Springer-Verlag, 1993."},{"key":"4_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1007\/3-540-46885-4_69","volume-title":"Advances in Cryptology \u2014 proceedings of Eurocrypt 89","author":"M. Waidner","year":"1990","unstructured":"M. Waidner and B. Pfitzmann. The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability In Advances in Cryptology \u2014 proceedings of Eurocrypt 89. Lecture Notes in Computer Science #434, page 690, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201995"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49264-X_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T04:40:50Z","timestamp":1550724050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49264-X_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540594093","9783540492641"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-49264-x_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}