{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:15Z","timestamp":1774946355569,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540669678","type":"print"},{"value":"9783540465881","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/978-3-540-46588-1_20","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T16:55:48Z","timestamp":1294332948000},"page":"293-305","source":"Crossref","is-referenced-by-count":27,"title":["Optimally Efficient Accountable Time-Stamping"],"prefix":"10.1007","author":[{"given":"Ahto","family":"Buldas","sequence":"first","affiliation":[]},{"given":"Helger","family":"Lipmaa","sequence":"additional","affiliation":[]},{"given":"Berry","family":"Schoenmakers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Benaloh, J., de Mare, M.: Efficient Broadcast Time-Stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science (August 1991)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 274\u2013285. Springer, Heidelberg (1994)"},{"key":"20_CR3","first-page":"329","volume-title":"Sequences 1991: Methods in Communication, Security, and Computer Science","author":"D. Bayer","year":"1992","unstructured":"Bayer, D., Haber, S.A., Stornetta, W.S.: Improving the Efficiency And Reliability of Digital Time-Stamping. In: Sequences 1991: Methods in Communication, Security, and Computer Science, pp. 329\u2013334. Springer, Heidelberg (1992)"},{"key":"#cr-split#-20_CR4.1","unstructured":"Buldas, A., Laud, P.: New Linking Schemes for Digital Time-Stamping. In: The 1st International Conference on Information Security and Cryptology, Seoul, Korea, December 18-19, pp. 3???14 (1998);"},{"key":"#cr-split#-20_CR4.2","unstructured":"Korea Institute of Information Security and Cryptology"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/BFb0055749","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"A. Buldas","year":"1998","unstructured":"Buldas, A., Laud, P., Lipmaa, H., Villemson, J.: Time- Stamping with Binary Linking Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 486\u2013501. Springer, Heidelberg (1998)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to Time-Stamp a Digital Document. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 437\u2013455. Springer, Heidelberg (1991)"},{"issue":"2","key":"20_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S.A. Haber","year":"1991","unstructured":"Haber, S.A., Stornetta, W.S.: How to Time-Stamp a Digital Document. Journal of Cryptology\u00a03(2), 99\u2013111 (1991)","journal-title":"Journal of Cryptology"},{"key":"20_CR8","volume-title":"Proceedings of the 1980 Symposium on Security and Privacy","author":"R.C. Merkle","year":"1980","unstructured":"Merkle, R.C.: Protocols for Public Key Cryptosystems. In: IEEE (ed.) Proceedings of the 1980 Symposium on Security and Privacy, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA. IEEE Computer Society Press, Los Alamitos (1980)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Sander, T.: Efficient Accumulators without Trapdoor. In: The Second International Conference on Information and Communication Security, Sydney, Australia, November 9-11 (1999) (to appear)","DOI":"10.1007\/978-3-540-47942-0_21"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-46588-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T12:56:47Z","timestamp":1559912207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-46588-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540669678","9783540465881"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-46588-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}