{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:17:38Z","timestamp":1764688658661},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540615125"},{"type":"electronic","value":"9783540686972"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68697-5_5","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T17:10:00Z","timestamp":1194541800000},"page":"61-73","source":"Crossref","is-referenced-by-count":26,"title":["Anonymous Communication and Anonymous Cash"],"prefix":"10.1007","author":[{"given":"Daniel R.","family":"Simon","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"D. Beaver, Foundations of Secure Interactive Computing, Proc. CRYPTO\u2019 91, pp. 377\u2013391.","DOI":"10.1007\/3-540-46766-1_31"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"S. Brands, Untraceable Off-Line Cash in Wallet with Observers, Proc. CRYPTO 93, pp. 302\u2013318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, Proc. CRYPTO\u2019 93, pp. 232\u2013249.","DOI":"10.1007\/3-540-48329-2_21"},{"issue":"2","key":"5_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, CACM vol. 24, no. 2 (1981), p. 84\u201388.","journal-title":"CACM"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology vol. 1, no. 1 (1988), pp. 65\u201375.","journal-title":"Journal of Cryptology"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum, Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA, Proc. EUROCRYPT\u2019 88, pp. 177\u2013182.","DOI":"10.1007\/3-540-45961-8_15"},{"key":"5_CR7","unstructured":"D. Chaum, Privacy Protected Payments-Unconditional Payer and\/or Payee Untraceability, SMART CARD 2000: The Future of IC Cards-Proc. IFIP WG 11.6 Intl Conf., North-Holland (1989), pp. 69\u201393."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, On-line Cash Checks, Proc. EUROCRYPT 89, pp. 288\u2013293.","DOI":"10.1007\/3-540-46885-4_30"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"R. Cleve, Limits on the Security of Coin Flips When Half the Processors are Faulty, Proc. 18th ACM Symposium on Theory of Computing (1986), pp. 364\u2013369.","DOI":"10.1145\/12130.12168"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat and M. Naor, Untraceable Electronic Cash, Proc. CRYPTO\u2019 88, pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich and Y. Yacobi, Electronic Wallet, Proc. CRYPTO 83, pp. 383\u2013386.","DOI":"10.1007\/978-1-4684-4730-9_28"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Yung, Secure and Efficient Off-Line Digital Money, Proc. 20th Intl Colloquium on Automata, Languages and Programming (1993), pp. 265\u2013276.","DOI":"10.1007\/3-540-56939-1_78"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest, A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks, SIAM J. Computing 17(2) (1988), pp. 281\u2013301.","journal-title":"SIAM J. Computing"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, Ripping Coins for a Fair Exchange, Proc. EUROCRYPT\u2019 95, pp. 220\u2013230.","DOI":"10.1007\/3-540-49264-X_18"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"G. Medvinsky and B.C. Neuman, Netcash: a Design for Practical Electronic Currency on the Internet, Proc. 1st ACM Conference on Computer and Communications Security (1993).","DOI":"10.1145\/168588.168601"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"S. Micali and P. Rogaway, Secure Computation, Proc. CRYPTO\u2019 91, pp. 392\u2013404.","DOI":"10.1007\/3-540-46766-1_32"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, Universal Electronic Cash, Proc. CRYPTO 91, pp. 324\u2013337.","DOI":"10.1007\/3-540-46766-1_27"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, How to Break and Repair a \u201cProvably Secure\u201d Untraceable Payment System, Proc. CRYPTO\u2019 91, pp. 338\u2013350.","DOI":"10.1007\/3-540-46766-1_28"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"J. Rompel, One-Way Functions Are Necessary and Sufficient for Secure Signatures, Proc. 31st IEEE Symp. on Foundations of Computer Science (1990), pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"C. Rackoff and D. Simon, Cryptographic Defense Against Traffic Analysis, Proc. 25th ACM Symp. on the Theory of Computation (1993), pp. 672\u2013681.","DOI":"10.1145\/167088.167260"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Y. Yacobi, Efficient Electronic Money, Proc. ASIACRYPT 94.","DOI":"10.1007\/BFb0000431"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68697-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T04:27:36Z","timestamp":1556944056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68697-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540615125","9783540686972"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-68697-5_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}