{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:53:59Z","timestamp":1725490439913},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_14","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:15:06Z","timestamp":1188314106000},"page":"140-147","source":"Crossref","is-referenced-by-count":0,"title":["A Design of Fair Blind Signatures Protocol Using PVNIOT"],"prefix":"10.1007","author":[{"given":"Jeom-goo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Do-hyeon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jeog-bae","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Rabin, M.: How to Exchange Secret by Oblivious Transfer. Harvard Center for Research in computer Technology, Cambridge, Mass. (1981)","key":"14_CR1"},{"doi-asserted-by":"crossref","unstructured":"Blum, M.: How to Exchange Secret Keys. ACM Transaction Computer System, 175\u2013193 (May 1983)","key":"14_CR2","DOI":"10.1145\/357360.357368"},{"doi-asserted-by":"crossref","unstructured":"Tedrick, T.: How to Exchange half a Bit. In: Proceedings of Crypto\u201983, pp. 147\u2013151 (1983)","key":"14_CR3","DOI":"10.1007\/978-1-4684-4730-9_13"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/3-540-39757-4_26","volume-title":"Advances in Cryptology","author":"R. Berger","year":"1985","unstructured":"Berger, R., Peralta, R., Tedrick, T.: A Provably Secure Oblivious Transfer Protocol. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 379\u2013386. Springer, Heidelberg (1985)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/3-540-39568-7_34","volume-title":"Advances in Cryptology","author":"T. Tedrick","year":"1985","unstructured":"Tedrick, T.: Fair Exchange of Secrets. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 434\u2013438. Springer, Heidelberg (1985)"},{"unstructured":"Kim, S.C., Oh, Y.S., Lee, S.H.: The Oblivious Transfer Protocol having non-repudiation function. The Korea Information Science Society\u00a026(3) (1999)","key":"14_CR6"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Bellare","year":"1990","unstructured":"Bellare, M., Micali, S.: Non-Interactive Oblivious Transfer and Applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 547\u2013557. Springer, Heidelberg (1990)"},{"issue":"10","key":"14_CR8","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1049\/el:19900416","volume":"26","author":"L. Harn","year":"1990","unstructured":"Harn, L., Lin, H.-Y.: Non-Interactive Oblivious Transfer. Electronic Letters\u00a026(10), 635\u2013636 (1990)","journal-title":"Electronic Letters"},{"unstructured":"Harn, L., Lin, H.-Y.: An Oblivious Transfer Protocol and its Application for the Exchange of Secrets. In: ASIACRYPTO\u201991, pp. 187\u2013190 (1991)","key":"14_CR9"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR11","first-page":"199","volume-title":"Advances in Cryptology : Proceedings of CRYPTO \u201982","author":"D. Chaum","year":"1982","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of CRYPTO \u201982, pp. 199\u2013203. Plenum Press, New York (1982)"},{"key":"14_CR12","first-page":"199","volume-title":"Advances in Cryptology : Proceedings of CRYPTO\u201982","author":"D. Chaum","year":"1982","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of CRYPTO\u201982, pp. 199\u2013203. Plenum Press, New York (1982)"},{"key":"14_CR13","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Crtpyology EUROCTYPYO \u201995","author":"M. Stadler","year":"1995","unstructured":"Stadler, M., Piveteau, J.M., Camenisch, J.: Fair Blind Signatures. In: Advances in Crtpyology EUROCTYPYO \u201995, pp. 209\u2013219. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:32:06Z","timestamp":1619505126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_14","relation":{},"subject":[]}}