{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:12:16Z","timestamp":1772262736083,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_32","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"465-479","source":"Crossref","is-referenced-by-count":135,"title":["Efficient and Generalized Group Signatures"],"prefix":"10.1007","author":[{"given":"Jan","family":"Camenisch","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"32_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"J. Benaloh","year":"1990","unstructured":"J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In S. Goldwasser, editor, Advances in Cryptology \u2014 CRYPTO\u2019 88, volume 403 of Lecture Notes in Computer Science, pages 27\u201335. Springer-Verlag, 1990."},{"key":"32_CR2","series-title":"Lecture Notes in Comp. Sc.","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Proc. EUROCRYPT\u201984","author":"R. Blom","year":"1985","unstructured":"R. Blom. An optimal class of symmetric key generation systems. Proc. EUROCRYPT\u201984, Lecture Notes in Comp. Sc., vol. 209, New York, NY: Springer Verlag, pages 335\u2013338, 1985."},{"key":"32_CR3","unstructured":"C. Boyd. Digital multisignatures. In H. J. Beker and F. Piper, editors, Cryptography and Coding, pages 241\u2013246. The Institute of Mathematics and its Applications Conference Series, Oxford Science Publications, 1989."},{"key":"32_CR4","unstructured":"S. Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, Apr. 1993."},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"D. Chaum","year":"1993","unstructured":"D. Chaum and T. Pedersen. Wallet databases with observers. In E. F. Brickell, editor, Advances in Cryptology \u2014 CRYPTO\u2019 92, volume 740 of Lecture Notes in Computer Science, pages 89\u2013105. Springer-Verlag, 1993."},{"key":"32_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"D. Chaum","year":"1991","unstructured":"D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology \u2014 EUROCRYPT\u2019 91, volume 547 of Lecture Notes in Computer Science, pages 257\u2013265. Springer-Verlag, 1991."},{"key":"32_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/BFb0053433","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 94","author":"L. Chen","year":"1995","unstructured":"L. Chen and T. P. Pedersen. New group signature schemes. In A. D. Santis, editor, Advances in Cryptology \u2014 EUROCRYPT\u2019 94, volume 950 of Lecture Notes in Computer Science, pages 171\u2013181. Springer-Verlag, 1995."},{"key":"32_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 94","author":"R. Cramer","year":"1994","unstructured":"R. Cramer, I. Damg\u00e5rd, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Advances in Cryptology \u2014 CRYPTO\u2019 94, volume 839 of Lecture Notes in Computer Science, pages 174\u2013187. Springer Verlag, 1994."},{"key":"32_CR9","unstructured":"R. Croft and S. Harris. Public key cryptography and re-usable shared secrets. In H. J. Beker and F. Piper, editors, Cryptography and Coding, pages 189\u2013201. The Institute of Mathematics and its Applications Conference Series, Oxford Science Publications, 1989."},{"key":"32_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 84","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology \u2014 CRYPTO\u2019 84, volume 196 of Lecture Notes in Computer Science, pages 10\u201318. Springer Verlag, 1985."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In Proc. 28th IEEE Symp. Found. Comp. Sc., pages 427\u2013437, 1987.","DOI":"10.1109\/SFCS.1987.4"},{"key":"32_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-68339-9_31","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 96","author":"R. Gennaro","year":"1996","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In U. Maurer, editor, Advances in Cryptology \u2014 EUROCRYPT\u2019 96, volume 1070 of Lecture Notes in Computer Science, pages 354\u2013371. Springer Verlag, 1996."},{"key":"32_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/BFb0034857","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 96","author":"S. J. Kim","year":"1996","unstructured":"S. J. Kim, S. J. Park, and D. H. Won. Convertible group signatures. In K. Kim and T. Matsumoto, editors, Advances in Cryptology \u2014 ASIACRYPT\u2019 96, volume 1163 of Lecture Notes in Computer Science, pages 311\u2013321. Springer Verlag, 1996."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. In 3rd ACM Conference on Computer and Communications Security, pages 48\u201357, New Delhi, Mar. 1996. acm press.","DOI":"10.1145\/238168.238185"},{"key":"32_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-57332-1_11","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 91","author":"K. Ohta","year":"1993","unstructured":"K. Ohta and T. Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In H. Imai, R. L. Rivest, and T. Matsumoto, editors, Advances in Cryptology \u2014 ASIACRYPT\u2019 91, volume 739 of Lecture Notes in Computer Science, pages 139\u2013148. Springer-Verlag, 1993."},{"key":"32_CR16","unstructured":"S. J. Park, I. S. Lee, and D. H. Won. A practical group signature. In Proceedings of the 1995 Japan-Korea Workshop on Information Security and Cryptography, pages 127\u2013133, Jan. 1995."},{"issue":"3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239\u2013252, 1991.","journal-title":"Journal of Cryptology"},{"issue":"11","key":"32_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Commun. ACM, 22(11):612\u2013613, Nov. 1979.","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T06:30:00Z","timestamp":1550730600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}