{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:01Z","timestamp":1725572041453},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_6","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"54-70","source":"Crossref","is-referenced-by-count":8,"title":["Detachable Electronic Coins"],"prefix":"10.1007","author":[{"given":"Chris","family":"Pavlovski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-48970-3_20","volume-title":"Information Security and Privacy","author":"C. Boyd","year":"1999","unstructured":"Boyd, C., Foo, E., Pavlovski, C.: Efficient Electronic Cash Using Batch Signatures. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, pp. 244\u2013257. Springer, Heidelberg (1999)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast Batch Verification for Modular Exponentiation and Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 236\u2013250. Springer, Heidelberg (1998)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable Off-line Cash in Wallet with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Evertse, E., Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalisations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 127\u2013141. Springer, Heidelberg (1988)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/BFb0054154","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Chan","year":"1998","unstructured":"Chan, A., Frankel, Y., Tsiounis, Y.: Easy Come - Easy Go Divisible Cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 561\u2013574. Springer, Heidelberg (1998)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-49162-7_15","volume-title":"Public Key Cryptography","author":"J.S. Coron","year":"1999","unstructured":"Coron, J.S., Naccache, D.: On The Security oif RSA Screening. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, p. 197. Springer, Heidelberg (1999)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"6_CR8","first-page":"318","volume-title":"Advances in Cryptology - Crypto 1993","author":"N. Ferguson","year":"1994","unstructured":"Ferguson, N.: Single Term Off-Line Coins. In: Advances in Cryptology - Crypto 1993, pp. 318\u2013328. Springer, Heidelberg (1994)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/0-387-34805-0_17","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"A. Fiat","year":"1990","unstructured":"Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 175\u2013185. Springer, Heidelberg (1990)"},{"key":"6_CR10","volume-title":"Graduate Texts in Mathematics","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: A course in number theory and cryptography. In: Graduate Texts in Mathematics, vol.\u00a0114. Springer, Heidelberg (1987)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","first-page":"85","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"D. Naccache","year":"1995","unstructured":"Naccache, D., M\u2019Raihi, D., Rapheali, D., Vaudenay, S.: Can DSA be improved: complexity trade-offs with the digital signature standard. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 85\u201394. Springer, Heidelberg (1995)"},{"key":"6_CR13","unstructured":"Nguyen, K.Q., Mu, Y., Varadharajan, V.: One-Response Off-line Digital Coins. In: Proceedings of SAC 1997 (1997)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/3-540-44750-4_35","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"T. Okamoto","year":"1995","unstructured":"Okamoto, T.: An Efficient Divisible Electronic Cash Scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 438\u2013451. Springer, Heidelberg (1995)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/0-387-34805-0_43","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"T. Okamoto","year":"1990","unstructured":"Okamoto, T., Ohta, K.: Divertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducibility. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 481\u2013946. Springer, Heidelberg (1990)"},{"key":"6_CR16","series-title":"LNCS","first-page":"324","volume-title":"Advances in Cryptology - Eurocrypt 1991","author":"T. Okamoto","year":"1992","unstructured":"Okamoto, T., Ohta, K.: Universal Electronic Cash. In: EUROCRYPT 1991. LNCS, pp. 324\u2013337. springer, Heidelberg (1992)"},{"key":"6_CR17","unstructured":"Pavlovski, C., Boyd, C.: Efficient Batch Signature Generation Using Tree Structures. In: CrypTEC 1999, Hong Kong (1999)"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.. Schnorr","year":"1990","unstructured":"Schnorr, C.: Efficient Signature Generation for Smart Cards. In: CRYPTO 1989. LNCS, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"6_CR19","unstructured":"Tsiounis, Y.: Efficient Electronic Cash: New Notions and Techniques, Ph.D. Thesis, College ofComputer Science, Northern University, Boston MA (June 1997)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/3-540-47555-9_19","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"Y. Yacobi","year":"1993","unstructured":"Yacobi, Y., Beller, M.: Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 208\u2013217. Springer, Heidelberg (1993)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Yen, S., Laih, C.: Improved Digital Signature Suitable for Batch Verification. IEEE Transactions on Computers\u00a044(7) (July 1995)","DOI":"10.1109\/12.392857"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T16:17:29Z","timestamp":1553271449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}