{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:09Z","timestamp":1747104189946,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_8","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"84-95","source":"Crossref","is-referenced-by-count":101,"title":["Asymmetric Fingerprinting"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Schunter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"8_CR1","unstructured":"Josh Cohen Benaloh: Verifiable Secret-Ballot Elections; Dissertation, Yale University, September 1987."},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/BF00196771","volume":"4\/","author":"D. Beaver","year":"1991","unstructured":"Donald Beaver: Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority; Journal of Cryptology 4\/2 (1991) 75\u2013122.","journal-title":"Journal of Cryptology"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Gilles Brassard, David Chaum, Claude Cr\u00e9peau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156\u2013189.","journal-title":"Journal of Computer and System Sciences"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"J. Brassil, S. Low, N. Maxemchuk, L. O\u2019Gorman: Electronic Marking and Identification Techniques to Discourage Document Copying; Proceedings IEEE INFOCOM 94, Toronto, June 12\u201316, 1994, 1278\u20131287.","DOI":"10.1109\/INFCOM.1994.337544"},{"key":"8_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Crypto\u2019 85","author":"G. R. Blakley","year":"1986","unstructured":"G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto\u2019 85, LNCS 218, Springer-Verlag, Berlin 1986, 180\u2013189."},{"key":"8_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u2019 95","author":"D. Boneh","year":"1995","unstructured":"Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto\u2019 95, LNCS 963, Springer-Verlag, Berlin 1995, 452\u2013465."},{"key":"8_CR7","first-page":"251","volume-title":"Proceedings VIS\u2019 95","author":"G. Caronni","year":"1995","unstructured":"Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS\u2019 95; Vieweg, Wiesbaden 1995, 251\u2013263."},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/3-540-48184-2_7","volume-title":"Crypto\u2019 87","author":"D. Chaum","year":"1988","unstructured":"David Chaum, Ivan B. Damg\u00e5rd, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party\u2019s input and correctness of the result; Crypto\u2019 87, LNCS 293, Springer-Verlag, Berlin 1988, 87\u2013119."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Josh D. Cohen, Michael J. Fischer: A robust and verifiable cryptographically secure election scheme; 26th FOCS, 1985, 372\u2013382.","DOI":"10.1109\/SFCS.1985.2"},{"key":"8_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Crypto\u2019 94","author":"B. Chor","year":"1994","unstructured":"Benny Chor, Amos Fiat, Moni Naor: Tracing traitors; Crypto\u2019 94, LNCS 839, Springer-Verlag, Berlin 1994, 257\u2013270."},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/65.386048","volume":"9\/","author":"A. K. Choudhury","year":"1995","unstructured":"Abhijit K. Choudhury, Nicholas F. Maxemchuk, Sanjoy Paul, Henning G. Schulzrinne: Copyright Protection for Electronic Publishing Over Computer Networks; IEEE Network 9\/3 (1995) 12\u201320.","journal-title":"IEEE Network"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Oded Goldreich: Towards a Theory of Software Protection and Simulation by Oblivious RAMs; 19th STOC, 1987, 182\u2013194.","DOI":"10.1145\/28395.28416"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game \u2014 or \u2014 a completeness theorem for protocols with honest majority; 19th STOC, 1987, 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"8_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/3-540-48184-2_9","volume-title":"Crypto\u2019 87","author":"J. Graaf van de","year":"1988","unstructured":"Jeroen van de Graaf, Ren\u00e9 Peralta: A simple and secure way to show the validity of your public key; Crypto\u2019 87, LNCS 293, Springer-Verlag, Berlin 1988, 128\u2013134."},{"issue":"6","key":"8_CR15","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83\/","author":"B. M. Macq","year":"1995","unstructured":"Benoit M. Macq, Jean-Jacques Quisquater: Cryptology for Digital TV Broadcasting; Proceedings of the IEEE 83\/6 (1995) 944\u2013957.","journal-title":"Proceedings of the IEEE"},{"key":"8_CR16","unstructured":"Silvio Micali, Phillip Rogaway: Secure Computation (Chapters 1\u20133); Laboratory for Computer Science, MIT; distributed at Crypto\u2019 91."},{"key":"8_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1007\/0-387-34805-0_55","volume-title":"Crypto\u2019 89","author":"R. Ostrovsky","year":"1990","unstructured":"Rafail Ostrovsky: An efficient software protection scheme; Crypto\u2019 89, LNCS 435, Springer-Verlag, Heidelberg 1990, 610\u2013611."},{"key":"8_CR18","first-page":"18","volume-title":"Fingerprinting","author":"N. R. Wagner","year":"1983","unstructured":"Neal R. Wagner: Fingerprinting; IEEE Symposium on Security and Privacy, Oakland, 1983, 18\u201322."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Andrew Chi-Chih Yao: How to Generate and Exchange Secrets; 27th FOCS, 1986, 162\u2013167.","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:20:40Z","timestamp":1737346840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}