{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:14Z","timestamp":1747104194254},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_21","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T04:16:22Z","timestamp":1292559382000},"page":"252-262","source":"Crossref","is-referenced-by-count":35,"title":["Efficient Accumulators without Trapdoor Extended Abstract"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Sander","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"N. Baric","year":"1997","unstructured":"Baric, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 480\u2013494. Springer, Heidelberg (1997)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 274\u2013285. Springer, Heidelberg (1994)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-49649-1_14","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"J. Camenisch","year":"1998","unstructured":"Camenisch, J., Michels, M.: A group signature scheme with improved efficiency. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 160\u2013174. Springer, Heidelberg (1998)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Fujisaki","year":"1997","unstructured":"Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 16\u201330. Springer, Heidelberg (1997)"},{"key":"21_CR5","volume-title":"An introduction to the theory of numbers","author":"G. Hardy","year":"1985","unstructured":"Hardy, G., Wright, E.: An introduction to the theory of numbers, 5th edn. Oxford University Press, Oxford (1985)","edition":"5"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/238168.238191","volume-title":"3rd ACM Conference on Computer and Communications Security","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Yung, M.: Revokable and versatile electronic mony. In: Neuman, C. (ed.) 3rd ACM Conference on Computer and Communications Security, New Delhi, India, pp. 76\u201387. ACM Press, New York (1996)"},{"key":"21_CR7","volume-title":"Proceedings of the 1980 Symposium on Security and Privacy","author":"R. Merkle","year":"1980","unstructured":"Merkle, R.: Protocols for public key cryptosystems. In: IEEE (ed.) Proceedings of the 1980 Symposium on Security and Privacy, Oakland, California, April 14-16, IEEE Computer Society Press, Los Alamitos (1980)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-60865-6_45","volume-title":"Fast Software Encryption","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 83\u201387. Springer, Heidelberg (1996)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/3-540-48405-1_35","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"T. Sander","year":"1999","unstructured":"Sander, T., Ta-Shma, A.: Auditable, anonymous electronic cash. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 555. Springer, Heidelberg (1999)"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/357353.357357","volume":"1","author":"A. Shamir","year":"1983","unstructured":"Shamir, A.: On the generation of cryptographically strong pseudorandom sequen-ces. ACM Transactions on Computer Systems\u00a01(1), 38\u201344 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"6","key":"21_CR11","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"von Solms, S., Naccache, D.: On blind signatures and perfect crimes. Computers and Security\u00a011(6), 581\u2013583 (1992)","journal-title":"Computers and Security"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T20:34:56Z","timestamp":1553286896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}