{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:55:45Z","timestamp":1776837345234,"version":"3.51.2"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319710747","type":"print"},{"value":"9783319710754","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_11","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"93-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Making Decryption Accountable"],"prefix":"10.1007","author":[{"given":"Mark D.","family":"Ryan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"11_CR1","unstructured":"Certificate Transparency (2007). www.certificate-transparency.org"},{"key":"11_CR2","unstructured":"Investigatory Powers Act (2016). www.legislation.gov.uk\/ukpga\/2016\/25\/contents\/enacted"},{"issue":"1","key":"11_CR3","first-page":"69","volume":"1","author":"H Abelson","year":"2015","unstructured":"Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., et al.: Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1), 69\u201379 (2015)","journal-title":"J. Cybersecur."},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Chuat, L., Szalachowski, P., Perrig, A., Laurie, B., Messeri, E.: Efficient gossip protocols for verifying the consistency of certificate logs. In: IEEE Conference on Communications and Network Security (CNS), pp. 415\u2013423 (2015)","DOI":"10.1109\/CNS.2015.7346853"},{"key":"11_CR6","unstructured":"Garman, C., Green, M., Miers, I.: Accountable privacy for decentralized anonymous payments. IACR Cryptology ePrint Archive 2016, 61 (2016). http:\/\/eprint.iacr.org\/2016\/061"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Liu, J., Ryan, M.D., Chen, L.: Balancing societal security and individual privacy: accountable escrow system. In: CSF (2014)","DOI":"10.1109\/CSF.2014.37"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Ryan, M.D.: Enhanced certificate transparency and end-to-end encrypted mail. In: Network and Distributed System Security (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23379"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:41:34Z","timestamp":1570394494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}