{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:40Z","timestamp":1725664780401},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540624943"},{"type":"electronic","value":"9783540680475"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-62494-5_3","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:37:59Z","timestamp":1330295879000},"page":"33-48","source":"Crossref","is-referenced-by-count":9,"title":["Practical escrow cash systems"],"prefix":"10.1007","author":[{"given":"Eiichiro","family":"Fujisaki","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,3]]},"reference":[{"key":"3_CR1","first-page":"302","volume":"93","author":"S. Brands","year":"1994","unstructured":"Brands, S., \u201cUntraceable Off-line Cash in Wallet with Observers\u201d, Proceedings of Crypto 93, pp. 302\u2013318 (1994).","journal-title":"Proceedings of Crypto"},{"key":"3_CR2","first-page":"231","volume":"95","author":"S. Brands","year":"1995","unstructured":"Brands, S., \u201cRestrictive Blinding of Secret-Key Certificates\u201d, Proceedings of Eurocrypt 95, pp. 231\u2013247 (1995).","journal-title":"Proceedings of Eurocrypt"},{"key":"3_CR3","unstructured":"Brickell, E., Gemmell, P., and Kravitz, D., \u201cTrustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change\u201d, Proceedings of SODA95, pp. 457\u2013466."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., and Wigderson, A., \u201cCompleteness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation\u201d, Proceeding of STOC88, pp 11\u201317.","DOI":"10.1145\/62212.62213"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D., Crepeau, C., and Damgard, I., \u201cMultiparty Unconditionally Secure Protocol\u201d, Proceeding of STOC88, pp 1\u201310.","DOI":"10.1145\/62212.62214"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D., \u201cUntraceable Electronic Mail, Return Address, and Digital Pseudonyms\u201d, Comm. of the ACM, 24, 2, pp. 84\u201388 (1981).","journal-title":"Comm. of the ACM"},{"key":"3_CR7","first-page":"199","volume":"92","author":"D. Chaum","year":"1992","unstructured":"Chaum, D., \u201cBlind Signatures for Untraceable Payments\u201d, Proceedings of Crypto 92, pp. 199\u2013203. (1992).","journal-title":"Proceedings of Crypto"},{"issue":"10","key":"3_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D., \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete,\u201d Comm. of the ACM, 28, 10, pp. 1030\u20131044 (1985).","journal-title":"Comm. of the ACM"},{"key":"3_CR9","first-page":"319","volume":"88","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., and Naor, M., \u201cUntraceable Electronic Cash,\u201d Proceedings of Crypto 88, pp. 319\u2013327 (1990).","journal-title":"Proceedings of Crypto"},{"key":"3_CR10","first-page":"428","volume":"94","author":"J. Camenisch","year":"1994","unstructured":"Camenisch, J., Piveteau, J., and Stadler, M., \u201cBlind Signatures Based on the Discrete Logarithm Problem\u201d, Proceedings of Eurocrypt 94, pp. 428\u2013432 (1994).","journal-title":"Proceedings of Eurocrypt"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Piveteau, J., and Stadler, M., \u201cAn Efficient Fair Payment System\u201d, Proceedings of 3rd ACM Conference on Computer Communications Security (1996).","DOI":"10.1145\/238168.238193"},{"key":"3_CR12","unstructured":"Damg\u00e5rd, I., \u201cPractical and Provably Secure Release of a Secret and Exchange of Signatures,\u201d Proceedings of Eurocrypt 93 (1993)."},{"key":"3_CR13","unstructured":"D'amingo, S. and Di Crescenzo, G., \u201cMethodology for Digital Money based on General Cryptographic Tools\u201d, to appear in the Proceedings of Eurocrypt 94."},{"key":"3_CR14","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/3-540-55210-3_204","volume":"92","author":"A. Santis De","year":"1992","unstructured":"De Santis, A. and Persiano, G., \u201cCommunication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)\u201d Proceedings of STACS 92, pp. 449\u2013460 (1992).","journal-title":"Proceedings of STACS"},{"key":"3_CR15","unstructured":"Eng, T. and Okamoto, T. \u201cSingle-Term Divisible Coins,\u201d to appear in the Proceedings of Eurocrypt 94."},{"key":"3_CR16","first-page":"318","volume":"93","author":"N. Ferguson","year":"1994","unstructured":"Ferguson, N., \u201cSingle Term Off-line Coins\u201d, Proceedings of Eurocrypt 93, pp. 318\u2013328 (1994).","journal-title":"Proceedings of Eurocrypt"},{"key":"3_CR17","first-page":"449","volume":"93","author":"M. Franklin","year":"1993","unstructured":"Franklin, M. and Yung, M., \u201cSecure and Efficient Off-Line Digital Money\u201d, Proceedings of ICALP 93, pp. 449\u2013460 (1993).","journal-title":"Proceedings of ICALP"},{"issue":"2","key":"3_CR18","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S. and Rivest, R., \u201cA Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,\u201d SIAM J. Comput., 17, 2, pp. 281\u2013308 (1988).","journal-title":"SIAM J. Comput."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S. and Wiederson, A., \u201cHow to play any mental game\u201d, Proceedings of STOC87, pp. 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"3_CR20","unstructured":"Goldreich, O., \u201cFoundations of Cryptography\u201d, Class Notes, Spring 1989."},{"key":"3_CR21","first-page":"294","volume":"90","author":"B. Hayes","year":"1990","unstructured":"Hayes, B., \u201cAnonymous One-Time Signatures and Flexible Untraceable Electronic Cash,\u201d Proceedings of Auscrypt 90. pp. 294\u2013305 (1990).","journal-title":"Proceedings of Auscrypt"},{"key":"3_CR22","first-page":"481","volume":"89","author":"T. Okamoto","year":"1990","unstructured":"Okamoto, T., and Ohta, K., \u201cDisposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash\u201d, Proceedings of Crypto 89, pp. 481\u2013496 (1990).","journal-title":"Proceedings of Crypto"},{"key":"3_CR23","first-page":"324","volume":"91","author":"T. Okamoto","year":"1992","unstructured":"Okamoto, T., and Ohta, K., \u201cUniversal Electronic Cash\u201d, Proceedings of Crypto 91, pp. 324\u2013337 (1992).","journal-title":"Proceedings of Crypto"},{"key":"3_CR24","first-page":"438","volume":"95","author":"T. Okamoto","year":"1995","unstructured":"Okamoto, T., \u201cAn Efficient Divisible Electronic Cash Scheme\u201d, Proceedings of Crypto 95, pp. 438\u2013451 (1995).","journal-title":"Proceedings of Crypto"},{"key":"3_CR25","first-page":"263","volume":"92","author":"J.C. Pailles","year":"1993","unstructured":"Pailles, J.C., \u201cNew Protocols for Electronic Money\u201d, Proceedings of Auscrypt 92, pp. 263\u2013274 (1993).","journal-title":"Proceedings of Auscrypt"},{"key":"3_CR26","first-page":"129","volume":"91","author":"T. P. Pedersen","year":"1992","unstructured":"Pedersen, T. P., \u201cNon-Interactive and Information-Theoretic Secure Verifiable Secret Sharing\u201d, Proceedings of Crypto 91, pp. 129\u2013140 (1992).","journal-title":"Proceedings of Crypto"},{"issue":"n.11","key":"3_CR27","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"24","author":"A. Shamir","year":"1979","unstructured":"Shamir, A., \u201cHow to share a secret\u201d, Communications of the ACM, v. 24, n.11, Nov 1979, pp. 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"3_CR28","first-page":"209","volume":"95","author":"M. Stadler","year":"1995","unstructured":"Stadler, M., Piveteau, J., and Camenisch, J., \u201cFair Blind Signature\u201d, Proceedings of Eurocrypt 95, pp. 209\u2013219 (1995).","journal-title":"Proceedings of Eurocrypt"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Vaudenay, S., \u201cOne-Time Identification with Low Memory,\u201d Eurocodes 92 (1992).","DOI":"10.1007\/978-3-7091-2786-5_19"},{"key":"3_CR30","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"von Solms, S., and Naccache, D., \u201cOn Blind Signatures and Perfect Crimes\u201d. Computer and Security, 11 (1992) pp 581\u2013583.","journal-title":"Computer and Security"},{"key":"3_CR31","unstructured":"Yacobi, Y., \u201cEfficient electronic money\u201d, to appear in the Proceedings of Asiacrypt 94."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-62494-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:12:43Z","timestamp":1605647563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-62494-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540624943","9783540680475"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/3-540-62494-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}