{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:14:06Z","timestamp":1765268046662},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540239758"},{"type":"electronic","value":"9783540305392"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_29","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T08:41:57Z","timestamp":1268383317000},"page":"417-429","source":"Crossref","is-referenced-by-count":8,"title":["Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes"],"prefix":"10.1007","author":[{"given":"Feng","family":"Bao","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","first-page":"8","volume-title":"Proceedings of the 4th ACM Conference on Computer and Communication Security","author":"N. Asokan","year":"1997","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocol for fair exchange. In: Proceedings of the 4th ACM Conference on Computer and Communication Security, pp. 8\u201317. ACM Press, New York (1997)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/BFb0054156","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 591\u2013606. Springer, Heidelberg (1998)"},{"key":"29_CR3","volume-title":"Proceedings of the 1998 IEEE Symposium on Security and Privacy","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. IEEE Computer Press, Oakland (1998)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G.: Efficient verifiable encryption and fair exchange of digital signatures. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS), pp. 138\u2013146 (1999)","DOI":"10.1145\/319709.319728"},{"key":"29_CR5","first-page":"77","volume-title":"Proceedings of 1998 IEEE Symposium on Security and Privacy","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R.H., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: Proceedings of 1998 IEEE Symposium on Security and Privacy, pp. 77\u201385. IEEE Computer Press, Los Alamitos (1998)"},{"issue":"1","key":"29_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"IT-36","author":"M. Ben-Or","year":"1990","unstructured":"Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.: A fair protocol for signing contracts. IEEE Transactions on Information Theory\u00a0IT-36(1), 40\u201346 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-49649-1_22","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"C. Boyd","year":"1998","unstructured":"Boyd, C., Foo, E.: Off-line fair payment protocols using convertible signature. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 271\u2013285. Springer, Heidelberg (1998)"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"29_CR9","first-page":"199","volume-title":"Advances in Cryptology \u2013 Proc. of Crypto 1982","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signature for untraceable payments. In: Advances in Cryptology \u2013 Proc. of Crypto 1982, pp. 199\u2013203. Plenum Press, New Tork (1983)"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/BFb0053427","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"D. Chaum","year":"1995","unstructured":"Chaum, D.: Designated confirmer signatures. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 86\u201391. Springer, Heidelberg (1995)"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-49649-1_23","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L. Chen","year":"1998","unstructured":"Chen, L.: Efficient fair exchange with verifiable confirmation of signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 286\u2013299. Springer, Heidelberg (1998)"},{"issue":"3","key":"29_CR12","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF02139147","volume":"4","author":"R.H. Deng","year":"1996","unstructured":"Deng, R.H., Gong, L., Lazar, A.A., Wang, W.: Practical protocol for certified electronic mail. Journal of Network and Systems Management\u00a04(3), 279\u2013297 (1996)","journal-title":"Journal of Network and Systems Management"},{"issue":"6","key":"29_CR13","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. CACM\u00a028(6), 637\u2013647 (1985)","journal-title":"CACM"},{"issue":"4","key":"29_CR14","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party. In: Proceedings of the 4th ACM Conferences on Computer and Communications Security, Zurich, Switzerland, April 1-4, pp. 1\u20135 (1997)","DOI":"10.1145\/266420.266424"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/3-540-46416-6_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"A. Fujioka","year":"1991","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: Interactive bi-proof systems and undeniable signature schemes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 243\u2013256. Springer, Heidelberg (1991)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L.C. Guillou","year":"1990","unstructured":"Guillou, L.C., Quisquater, J.J.: A \u201cParadoxical\u201d identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 216\u2013231. Springer, Heidelberg (1990)"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Naccache, D., Stern, J.: A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS), pp. 59\u201366 (1998)","DOI":"10.1145\/288090.288106"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/BFb0054142","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Michels","year":"1998","unstructured":"Michels, M., Stadler, M.: Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 406\u2013421. Springer, Heidelberg (1998)"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Ohta, K.: How to simultaneously exchange secrets by general assumption. In: Proceedings of 2nd ACM Conference on Computer and Communications Security, pp. 184\u2013192 (1994)","DOI":"10.1145\/191177.191221"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A new public key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"key":"29_CR22","first-page":"411","volume-title":"Proc. Internat. Congr. Math.","author":"C. Pomerance","year":"1995","unstructured":"Pomerance, C.: On the Role of Smooth Numbers in Number Theoretic Algorithms. In: Chatterji, S.D. (ed.) Proc. Internat. Congr. Math., Zrich, Switzerland, vol.\u00a01, pp. 411\u2013422. Birkh\u00fcser, Basel (1995)"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","first-page":"225","volume-title":"Proceedings Crypto 1989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient signature generation for smart cards. In: CRYPTO 1989. LNCS, pp. 225\u2013232. Springer, Heidelberg (1990)"},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Stadler","year":"1996","unstructured":"Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 190\u2013199. Springer, Heidelberg (1996)"},{"key":"29_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-40061-5_11","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"C.-H. Wang","year":"2003","unstructured":"Wang, C.-H.: Untraceable fair network payment protocols with off-line TTP. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 173\u2013187. Springer, Heidelberg (2003)"},{"key":"29_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/SECPRI.1996.502669","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"J. Zhou","year":"1996","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 55\u201361. IEEE Computer Press, Los Alamitos (1996)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:59:09Z","timestamp":1605743949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}