{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:30:39Z","timestamp":1737437439320,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754954"},{"type":"electronic","value":"9783540754961"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75496-1_10","type":"book-chapter","created":{"date-parts":[[2007,9,18]],"date-time":"2007-09-18T07:29:35Z","timestamp":1190100575000},"page":"145-157","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Certified Email Protocol"],"prefix":"10.1007","author":[{"given":"Jun","family":"Shao","sequence":"first","affiliation":[]},{"given":"Min","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G.: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. In: ACM CCS 1999, pp. 138\u2013146 (1999)","DOI":"10.1145\/319709.319728"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certificated email with a light on-line trusted third party: Design and implementation. In: WWW 2002, pp. 387\u2013395 (2002)","DOI":"10.1145\/511446.511497"},{"key":"10_CR3","unstructured":"Ateniese, G., de Medeiros, B., Goodrich, M.: TRICERT: Distributed certified email schemes. In: NDSS 2001 (February 2001)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-45760-7_13","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"G. Ateniese","year":"2002","unstructured":"Ateniese, G., Nita-Rotaru, C.: Stateless-recipient certified Email system based on verfiable encryption. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 182\u2013199. Springer, Heidelberg (2002)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/BFb0054156","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 591\u2013606. Springer, Heidelberg (1998)"},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communication\u00a018(4), 593\u2013610 (2000)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/978-3-540-30539-2_29","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"F. Bao","year":"2004","unstructured":"Bao, F.: Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 417\u2013429. Springer, Heidelberg (2004)"},{"issue":"2","key":"10_CR8","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS)\u00a046(2), 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society (AMS)"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/18.850673","volume":"46","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Durfee, G.: Cryptanalysis of RSA with Private Key d Less Than N 0.292. IEEE Trans. on Info. Theo.\u00a046(4), 1339\u20131349 (2000)","journal-title":"IEEE Trans. on Info. Theo."},{"key":"10_CR10","unstructured":"Bao, F., Deng, R., Mao, W.: Efficient and Practical Fair Exchange Protocols. In: Proceedings of 1998 IEEE Symposium on Security and Privacy, pp. 77\u201385 (1998)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-49649-1_22","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"C. Boyd","year":"1998","unstructured":"Boyd, C., Foo, E.: Off-line Fair Payment Protocols using Convertible Signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 271\u2013285. Springer, Heidelberg (1998)"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M. Ben-Or","year":"1990","unstructured":"Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Transactions on Information Theory\u00a036(1), 40\u201346 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44598-6_15","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Naor, M.: Timed Commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 236\u2013254. Springer, Heidelberg (2000)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM CCS 1993, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"10_CR15","unstructured":"Bahreman, A., Tygar, J.D.: Certified electronic mail. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 3\u201319 (1994)"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/232335.232338","volume":"26","author":"T. Coffey","year":"1996","unstructured":"Coffey, T., Daiha, P.: Non-repudiation with mandatory proof of receipt. Computer Communication Review\u00a026(1), 6\u201317 (1996)","journal-title":"Computer Communication Review"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-49649-1_23","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L. Chen","year":"1998","unstructured":"Chen, L.: Efficient Fair Exchange with Verifiable Confirmation of Signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 286\u2013299. Springer, Heidelberg (1998)"},{"issue":"4","key":"10_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00191356","volume":"8","author":"I.B. Damg\u00e5rd","year":"1995","unstructured":"Damg\u00e5rd, I.B.: Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology\u00a08(4), 201\u2013222 (1995)","journal-title":"Journal of Cryptology"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L.: Breaking and Repairing Optimistic Fair Exchange from PODC 2003. In: ACM DRM 2003, pp. 47\u201354 (2003)","DOI":"10.1145\/947380.947387"},{"issue":"6","key":"10_CR21","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM\u00a028(6), 637\u2013647 (1985)","journal-title":"Communications of the ACM"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Infor. Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Trans. Infor. Theory"},{"key":"10_CR23","unstructured":"Even, S., Yacobi, Y.: Relations among public key signature schemes, Technical Report 175, Computer Science Department, Technion, Israel (1980)"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","first-page":"133","volume-title":"Advances in Cryptology 1981 - 1997","author":"O. Goldreich","year":"1999","unstructured":"Goldreich, O.: A simple protocol for signing contracts. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol.\u00a01440, pp. 133\u2013136. Springer, Heidelberg (1999)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/3-540-48405-1_29","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Garay","year":"1999","unstructured":"Garay, J., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 449\u2013466. Springer, Heidelberg (1999)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Haller, N.M.: The S\/KEY one-time password system. In: Proceedings of the Internet Society Symposium on Network and Distributed Systems (1994)","DOI":"10.17487\/rfc1760"},{"key":"10_CR27","unstructured":"Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. In: SCN 1999. Proc. of 2nd Conference on Security in Communication Networks, Amalfi, Italy (1999)"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-46088-8_26","volume-title":"Financial Cryptography","author":"O. Markowitch","year":"2002","unstructured":"Markowitch, O., Saeednia, S.: Optimistic fairexchange with transparent signature recovery. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 339\u2013350. Springer, Heidelberg (2002)"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Nenadi\u0107, A., Zhang, N., Barton, S.: A Security Protocol for Certified E-goods Delivery. In: ITCC 2004. Proc. IEEE Int. Conf. Information Technology, Coding, and Computing, pp. 22\u201328 (2004)","DOI":"10.1109\/ITCC.2004.1286420"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-44586-2_8","volume-title":"Public Key Cryptography","author":"T. Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: The gap-problems: a new class of problems for the security of cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 104\u2013118. Springer, Heidelberg (2001)"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Park, J.M., Chong, E., Siegel, H., Ray, I.: Constructing Fair-Exchange Protocols for E-Commerce Via Distributed Computation of RSA Signatures. In: PODC 2003, pp. 172\u2013181 (2003)","DOI":"10.1145\/872035.872060"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Park, J.M., Ray, I., Chong, E.K.P., Siegel, H.J.: A Certified email Protocol Suitable for Mobile Environments. In: GLOBECOM 2003, pp. 1394\u20131398 (2003)","DOI":"10.1109\/GLOCOM.2003.1258467"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"10_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/3-540-36231-2_26","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"K. Imamoto","year":"2002","unstructured":"Imamoto, K., Sakurai, K.: A certified email system with receiver\u2019s selective usage of delivery authority. In: Menezes, A.J., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 326\u2013338. Springer, Heidelberg (2002)"},{"key":"10_CR35","unstructured":"Wang, G.: Generic fair non-repudiation protocols with transparent off-line TTP. In: IWAP 2005, pp. 51\u201365 (2005)"},{"issue":"5","key":"10_CR36","doi-asserted-by":"crossref","first-page":"441","DOI":"10.3233\/JCS-2006-14504","volume":"14","author":"G. Wang","year":"2006","unstructured":"Wang, G.: Generic Non-Repudiation Protocols Supporting Transparent Off-line TTP. Journal of Computer Security\u00a014(5), 441\u2013467 (2006)","journal-title":"Journal of Computer Security"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-44463-7_8","volume-title":"Electronic Commerce and Web Technologies","author":"I. Ray","year":"2000","unstructured":"Ray, I., Ray, I.: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol.\u00a01875, pp. 84\u201393. Springer, Heidelberg (2000)"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.dss.2003.10.011","volume":"39","author":"I. Ray","year":"2005","unstructured":"Ray, I., Ray, I., Natarajan, N.: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems\u00a039, 267\u2013292 (2005)","journal-title":"Decision Support Systems"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Borrell, J., Robles, S., Serra, J., Riera, A.: Securing the Itinerary of Mobile Agents through a Non-Repudiation Protocol. In: Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on, pp. 461\u2013464 (1999)","DOI":"10.1109\/CCST.1999.797954"},{"issue":"3","key":"10_CR40","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology\u00a04(3), 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Eberle, H., Gura, N., Shantz, S.C., et al.: A Public Key Cryptography processor for RSA and ECC. In: Application-Specific Systems, Architectures and Processors, pp. 98\u2013110 (2004)","DOI":"10.1109\/ASAP.2004.1342462"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75496-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T01:27:21Z","timestamp":1737422841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75496-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540754954","9783540754961"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75496-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}