{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:05Z","timestamp":1725558665303},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201502"},{"type":"electronic","value":"9783540399278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39927-8_24","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:51:33Z","timestamp":1277700693000},"page":"260-268","source":"Crossref","is-referenced-by-count":5,"title":["A Simple Anonymous Fingerprinting Scheme Based on Blind Signature"],"prefix":"10.1007","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shuwang","family":"L\u00fc","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Advances in Cryptology","author":"G.R. Blakley","year":"1986","unstructured":"Blakley, G.R., Meadows, C., Prudy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 180\u2013189. Springer, Heidelberg (1986)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"IT-44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. on Inform. Theory\u00a0IT-44, 1897\u20131905 (1998)","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-44448-3_32","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"J. Camenisch","year":"2000","unstructured":"Camenisch, J.: Efficient anonymdous fingerprinting with group Signatures. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 415\u2013428. Springer, Heidelberg (2000)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/BFb0053458","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"J.L. Camenisch","year":"1995","unstructured":"Camenisch, J.L., Piveteau, J.M., Stadler, M.A.: Blind signatures based on the Discrete Logarithm Problem. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 428\u2013432. Springer, Heidelberg (1995)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-45247-8_18","volume-title":"Information Security and Cryptology - ICISC 2000","author":"C. Chung","year":"2001","unstructured":"Chung, C., Choi, S., Choi, Y., Won, D.: Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors. In: Won, D. (ed.) ICISC 2000. LNCS, vol.\u00a02015, pp. 221\u2013234. Springer, Heidelberg (2001)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/10721064_20","volume-title":"Smart Card. Research and Applications","author":"J. Domingo-Ferrer","year":"2000","unstructured":"Domingo-Ferrer, J., Herrera-Joancomarti, J.: Efficient smart-card based anonymous fingerprinting. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 221\u2013228. Springer, Heidelberg (2000)"},{"issue":"13","key":"24_CR7","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1049\/el:19980961","volume":"34","author":"J. Domingo-Ferrer","year":"1998","unstructured":"Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. IEE Electronics Letters\u00a034(13), 1303\u20131304 (1998)","journal-title":"IEE Electronics Letters"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-49162-7_4","volume-title":"Public Key Cryptography","author":"J. Domingo-Ferrer","year":"1999","unstructured":"Domingo-Ferrer, J.: Anonymous fingerprinting based on Committed Oblivious Transfer. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 43\u201352. Springer, Heidelberg (1999)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/3-540-36159-6_9","volume-title":"Information and Communications Security","author":"M. Kim","year":"2002","unstructured":"Kim, M., Kim, J., Kim, K.: Anonymous fingerprinting as secure as the bilinear Diffie-Hellman Assumption. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 97\u2013108. Springer, Heidelberg (2002)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45311-3_3","volume-title":"Progress in Cryptology - INDOCRYPT 2001","author":"M. Kuribayashi","year":"2001","unstructured":"Kuribayashi, M., Tanaka, H.: A new anonymous fingerprinting scheme with high enciphering Rate. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol.\u00a02247, pp. 30\u201339. Springer, Heidelberg (2001)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"B. Pfitzmann","year":"1999","unstructured":"Pfitzmann, B., Sadeghi, A.: Coin-based anonymous fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 150\u2013164. Springer, Heidelberg (1999)"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-44448-3_31","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"B. Pfitzmann","year":"2000","unstructured":"Pfitzmann, B., Sadeghi, A.: Anonymous Fingerprinting with direct nonrepudiation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 401\u2013414. Springer, Heidelberg (2000)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/3-540-45496-9_28","volume-title":"Information Hiding","author":"A. Sadeghi","year":"2001","unstructured":"Sadeghi, A.: How to break a semi-anonymous fingerprinting Scheme. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 384\u2013394. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39927-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T03:59:11Z","timestamp":1552622351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39927-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201502","9783540399278"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39927-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}