{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:07Z","timestamp":1725888607115},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_22","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"381-389","source":"Crossref","is-referenced-by-count":15,"title":["Certificate Transparency with Enhancements and Short Proofs"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Singh","sequence":"first","affiliation":[]},{"given":"Binanda","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"Selected Areas in Cryptography","author":"PSLM Barreto","year":"2006","unstructured":"Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319\u2013331. Springer, Heidelberg (2006). doi: 10.1007\/11693383_22"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"J Benaloh","year":"1994","unstructured":"Benaloh, J., Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274\u2013285. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48285-7_24"},{"key":"22_CR3","unstructured":"Bernstein, D.J., Lange, T.: eBASH: ECRYPT benchmarking of all submitted hashes. http:\/\/bench.cr.yp.to\/ebash.html"},{"key":"22_CR4","unstructured":"Brewster, T.: Diginotar goes bankrupt after hack (2011). http:\/\/www.itpro.co.uk\/636244\/diginotar-goes-bankrupt-after-hack"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-04873-4_14","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2013","author":"C Chuengsatiansup","year":"2014","unstructured":"Chuengsatiansup, C., Naehrig, M., Ribarski, P., Schwabe, P.: PandA: Pairings and arithmetic. In: Cao, Z., Zhang, F. (eds.) Pairing 2013. LNCS, vol. 8365, pp. 229\u2013250. Springer, Cham (2014). doi: 10.1007\/978-3-319-04873-4_14"},{"key":"22_CR6","unstructured":"Damg\u00e5rd, I., Triandopoulos, N.: Supporting non-membership proofs with bilinear-map accumulators. IACR Cryptology ePrint Archive 2008, 538 (2008)"},{"key":"22_CR7","unstructured":"Google: Certificate transparency. https:\/\/www.certificate-transparency.org\/"},{"key":"22_CR8","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. https:\/\/tools.ietf.org\/html\/rfc6962"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO 1989 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). doi: 10.1007\/0-387-34805-0_21"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Ryan, M.D.: Enhanced certificate transparency and end-to-end encrypted mail. In: NDSS 2014 (2014). http:\/\/www.internetsociety.org\/doc\/enhanced-certificate-transparency-and-end-end-encrypted-mail","DOI":"10.14722\/ndss.2014.23379"},{"key":"22_CR11","unstructured":"Singh, A., Sengupta, B., Ruj, S.: Certificate transparency with enhancements and short proofs. CoRR abs\/1704.04937 (2017). https:\/\/arxiv.org\/abs\/1704.04937"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T02:50:44Z","timestamp":1569379844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}