{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:54Z","timestamp":1766449734387},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_17","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"238-254","source":"Crossref","is-referenced-by-count":3,"title":["A Formal Concept of Domain Pseudonymous Signatures"],"prefix":"10.1007","author":[{"given":"Kamil","family":"Kluczniak","sequence":"first","affiliation":[]},{"given":"Lucjan","family":"Hanzlik","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-33383-5_7","volume-title":"Information Security","author":"J Bender","year":"2012","unstructured":"Bender, J., Dagdelen, \u00d6., Fischlin, M., K\u00fcgler, D.: Domain-specific pseudonymous signatures for the German identity card. In: Bishop, M., Nascimento, A.C.A. (eds.) ISC 2016. LNCS, vol. 9866, pp. 104\u2013119. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33383-5_7"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-642-38631-2_52","volume-title":"Network and System Security","author":"J Bringer","year":"2013","unstructured":"Bringer, J., Chabanne, H., Patey, A.: Collusion-resistant domain-specific pseudonymous signatures. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 649\u2013655. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38631-2_52"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-662-45472-5_16","volume-title":"Financial Cryptography and Data Security","author":"J Bringer","year":"2014","unstructured":"Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 255\u2013272. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45472-5_16"},{"key":"17_CR4","unstructured":"BSI: Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token 2.20. Technical Guideline TR-03110-2 (2015)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-662-49387-8_10","volume-title":"Public-Key Cryptography \u2013 PKC 2016","author":"J Camenisch","year":"2016","unstructured":"Camenisch, J., Drijvers, M., Lehmann, A.: Universally composable direct anonymous attestation. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9614, pp. 234\u2013264. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49387-8_10"},{"key":"17_CR6","unstructured":"Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.: Formal treatment of privacy-enhancing credential systems. Cryptology ePrint Archive, Report 2014\/708 (2014). http:\/\/eprint.iacr.org\/"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"J Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410\u2013424. Springer, Heidelberg (1997). doi: 10.1007\/BFb0052252"},{"key":"17_CR8","unstructured":"Christian Paquin, G.Z.: U-Prove cryptographic specification v1.1 (revision 3), December 2013. https:\/\/www.microsoft.com\/en-us\/research\/publication\/u-prove-cryptographic-specification-v1-1-revision-3\/"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Hanzlik, L., Kluczniak, K., Kuty\u0142owski, M.: Insecurity of anonymous login with German personal identity cards. In: SocialSec 2015, pp. 39\u201343. IEEE (2015)","DOI":"10.1109\/SocialSec2015.12"},{"key":"17_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-27164-4_3","volume-title":"E-Democracy \u2013 Citizen Rights in the World of the New Computing Paradigms","author":"M Herfert","year":"2015","unstructured":"Herfert, M., Lange, B., Selzer, A., Waldmann, U.: A privacy-friendly method to reward participants of online-surveys. In: Katsikas, S.K., Sideridis, A.B. (eds.) e-Democracy 2015. CCIS, vol. 570, pp. 33\u201347. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-27164-4_3"},{"key":"17_CR11","unstructured":"Kluczniak, K.: Domain-specific pseudonymous signatures revisited. Cryptology ePrint Archive, Report 2016\/070 (2016). http:\/\/eprint.iacr.org\/2016\/070"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-25645-0_19","volume-title":"Network and System Security","author":"K Kluczniak","year":"2015","unstructured":"Kluczniak, K., Hanzlik, L., Kubiak, P., Kuty\u0142owski, M.: Anonymous evaluation system. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 283\u2013299. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25645-0_19"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kuty\u0142owski, M., Shao, J.: Signing with multiple ID\u2019s and a single key. In: Consumer Communications and Networking Conference (CCNC), pp. 519\u2013520. IEEE (2011)","DOI":"10.1109\/CCNC.2011.5766527"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-319-40367-0_31","volume-title":"Information Security and Privacy","author":"M Kuty\u0142owski","year":"2016","unstructured":"Kuty\u0142owski, M., Hanzlik, L., Kluczniak, K.: Pseudonymous signature on eIDAS token \u2013 implementation based privacy threats. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 467\u2013477. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-40367-0_31"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-46513-8_14","volume-title":"Selected Areas in Cryptography","author":"A Lysyanskaya","year":"2000","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 184\u2013199. Springer, Heidelberg (2000). doi: 10.1007\/3-540-46513-8_14"},{"issue":"2","key":"17_CR16","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D Boneh","year":"2008","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149\u2013177 (2008). Springer","journal-title":"J. Cryptol."},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56\u201372. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28628-8_4"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:46:23Z","timestamp":1498358783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}