{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:26Z","timestamp":1725494426395},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_15","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"169-180","source":"Crossref","is-referenced-by-count":1,"title":["A Credential-Based System for the Anonymous Delegation of Rights"],"prefix":"10.1007","author":[{"given":"Liesje","family":"Demuynck","sequence":"first","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Michael Backes, Jan Camenisch, and Dieter Sommer. Anonymous yet accountable access control. In WPES, pages 40\u201346, 2005.","DOI":"10.1145\/1102199.1102208"},{"key":"15_CR2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"S. A. Brands","year":"2000","unstructured":"S. A. Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge, MA, USA, 2000."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Stefan Brands, Liesje Demuynck, and Bart De Decker. A practical system for globally revoking the unlinkable pseudonyms of unknown users. Technical Report CW472, Katholieke Universiteit Leuven, 2006.","DOI":"10.1007\/978-3-540-73458-1_29"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT, pages 93\u2013118, 2001.","DOI":"10.1007\/3-540-44987-6_7"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Victor Shoup. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO, pages 126\u2013144, 2003.","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Dieter Sommer, and Roger Zimmermann, a general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. RZ 3629, IBM Zurich Research Laboratory, July 2005.","DOI":"10.1007\/0-387-33406-8_3"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd and Eiichiro Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order. In ASIACRYPT, pages 125\u2013142, 2002.","DOI":"10.1007\/3-540-36178-2_8"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Liesje Demuynck and Bart De Decker. Credential-based systems for the anonymous delegation of rights. Technical Report CW468, K.U. Leuven, 2006.","DOI":"10.1007\/978-0-387-72367-9_15"},{"key":"15_CR9","unstructured":"Liesje Demuynck and Bart De Decker. How to prove list membership in logarithmic time. Technical Report CW470, Katholieke Universiteit Leuven, 2006."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"10. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. Pseudonym systems. In Selected Areas in Cryptography, pages 184\u2013199, 1999.","DOI":"10.1007\/3-540-46513-8_14"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Torben P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO, pages 129\u2013140, 1991.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Sven Wohlgemuth and G\u00fcnter M\u00fcller. Privacy with delegation of rights by identity management. In G\u00fcnter M\u00fcller, editor, ETRICS, volume 3995 of Lecture Notes in Computer Science, pages 175\u2013190. Springer, 2006.","DOI":"10.1007\/11766155_13"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T13:34:04Z","timestamp":1684071244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_15","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}