{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:12Z","timestamp":1725889032564},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_10","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"136-154","source":"Crossref","is-referenced-by-count":0,"title":["A Distributed Investment Encryption Scheme: Investcoin"],"prefix":"10.1007","author":[{"given":"Filipp","family":"Valovich","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1257\/aer.102.3.65","volume":"102","author":"EA Abbe","year":"2012","unstructured":"Abbe, E.A., Khandani, A.E., Lo, A.W.: Privacy-preserving methods for sharing financial risk exposures. Am. Econ. Rev. 102(3), 65\u201370 (2012)","journal-title":"Am. Econ. Rev."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Benhamouda, F., Joye, M., Libert, B.: A new framework for privacy-preserving aggregation of time-series data. ACM Trans. Inf. Syst. Secur. 18(3), 10 (2016)","DOI":"10.1145\/2873069"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Blum, A., Morgenstern, J., Sharma, A., Smith, A.: Privacy-preserving public information for sequential games. In: Proceedings of ITCS 2015, pp. 173\u2013180 (2015)","DOI":"10.1145\/2688073.2688100"},{"key":"10_CR4","unstructured":"Blum, M.: Coin flipping by telephone. In: Proceedings of Crypto 1981, pp. 11\u201315 (1981)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-45539-6_31","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"F Boudot","year":"2000","unstructured":"Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431\u2013444. Springer, Heidelberg (2000). doi: 10.1007\/3-540-45539-6_31"},{"issue":"2","key":"10_CR6","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., Cr\u00e9peau, C.: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37(2), 156\u2013189 (1988)","journal-title":"J. Comput. Syst. Sci."},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-540-89255-7_15","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"J Camenisch","year":"2008","unstructured":"Camenisch, J., Chaabouni, R., Shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234\u2013252. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89255-7_15"},{"key":"10_CR8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. J. Int. Assoc. Cryptologic Res. 13, 143\u2013202 (2000)","journal-title":"J. Cryptol. J. Int. Assoc. Cryptologic Res."},{"key":"10_CR9","unstructured":"The Financial Crisis Inquiry Report: Final Report of the National Commission on the Causes of the Financial and Economic Crisis in the United States (2011)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology \u2014 CRYPTO 94","author":"R Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174\u2013187. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48658-5_19"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). doi: 10.1007\/3-540-47721-7_12"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Flood, M., Katz, J., Ong, S., Smith, A.: Cryptography and the economics of supervisory information: balancing transparency and confidentiality. Federal Reserve Bank of Cleveland, Working Paper no. 13-11 (2013)","DOI":"10.26509\/frbc-wp-201312"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, New York (2004)","DOI":"10.1017\/CBO9780511721656"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jentzsch, N.: The Economics and Regulation of Financial Privacy - A Comparative Analysis of the United States and Europe (2001, submitted)","DOI":"10.2139\/ssrn.295539"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Joye, M., Libert, B.: A scalable scheme for privacy-preserving aggregation of time-series data. In Proceedings of FC 2013, pp. 111\u2013125 (2013)","DOI":"10.1007\/978-3-642-39884-1_10"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: Proceedings of SP 2013, pp. 397\u2013411 (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"10_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Nofer, M.: The value of social media for predicting stock returns - preconditions, instruments and performance analysis. Ph.D. thesis, Technische Universit\u00e4t Darmstadt (2014)","DOI":"10.1007\/978-3-658-09508-6"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 91","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). doi: 10.1007\/3-540-46766-1_9"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Peng, K., Boyd, C., Dawson, E., Okamoto, E.: A novel range test, pp. 247\u2013258 (2006)","DOI":"10.1007\/11780656_21"},{"key":"10_CR21","unstructured":"Peng, K., Dawson, E.: A range test secure in the active adversary model. In: Proceedings of ACSW 2007, pp. 159\u2013162 (2007)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1007\/3-540-46885-4_68","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 89","author":"CP Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 688\u2013689. Springer, Heidelberg (1990). doi: 10.1007\/3-540-46885-4_68"},{"key":"10_CR23","unstructured":"Elaine Shi, T.-H., Chan, H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proceedings of NDSS 2011 (2011)"},{"key":"10_CR24","unstructured":"Valovich, F., Ald\u00e0, F.: Private stream aggregation revisited. CoRR abs\/1507.08071 (2015)"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T11:24:06Z","timestamp":1569410646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}