{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:20:41Z","timestamp":1743006041578,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020018"},{"type":"electronic","value":"9783642020025"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02002-5_7","type":"book-chapter","created":{"date-parts":[[2009,5,13]],"date-time":"2009-05-13T12:20:10Z","timestamp":1242217210000},"page":"116-137","source":"Crossref","is-referenced-by-count":1,"title":["Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment"],"prefix":"10.1007","author":[{"given":"Yuki","family":"Hara","sequence":"first","affiliation":[]},{"given":"Taiki","family":"Ishiwata","sequence":"additional","affiliation":[]},{"given":"Junji","family":"Shikata","sequence":"additional","affiliation":[]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-44987-6_9","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"M. Abe","year":"2001","unstructured":"Abe, M.: A secure three-move blind signature scheme for polynomially many signatures. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 136\u2013151. Springer, Heidelberg (2001)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-46088-8_25","volume-title":"Financial Cryptography","author":"M. Bellare","year":"2002","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The power of RSA inversion oracles and the security of Chaum\u2019s RSA-based blind signature scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 319\u2013338. Springer, Heidelberg (2002)"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00145-002-0120-1","volume":"16","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The One-More-RSA-Inversion problems and security of Chaum\u2019s blind signature scheme. J. Cryptology\u00a016(3), 185\u2013215 (2003)","journal-title":"J. Cryptology"},{"key":"7_CR4","first-page":"133","volume-title":"24th IEEE Spring Computer Conference","author":"M. Blum","year":"1982","unstructured":"Blum, M.: Coin flipping by telephone: a protocol for solving impossible problems. In: 24th IEEE Spring Computer Conference, pp. 133\u2013137. IEEE Press, Los Alamitos (1982)"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1016501125022","volume":"26","author":"C. Blundo","year":"2002","unstructured":"Blundo, C., Masucci, B., Stinson, D.R., Wei, R.: Constructions and bounds for unconditionally secure non-interactive commitment schemes. Designs, Codes, and Cryptography\u00a026, 97\u2013110 (2002)","journal-title":"Designs, Codes, and Cryptography"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-30598-9_10","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., Koprowski, M., Warinschi, B.: Efficient blind signatures without random oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 134\u2013148. Springer, Heidelberg (2005)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology 1981 - 1997, pp. 199\u2013204. Prenum Publishing Corporation (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"#cr-split#-7_CR10.1","doi-asserted-by":"crossref","unstructured":"Hanaoka, G., Shikata, J., Hanaoka, Y., Imai, H.: Unconditionally secure anonymous encryption and group authentication. The Computer Journal\u00a049, 310\u2013321 (2006);","DOI":"10.1093\/comjnl\/bxh149"},{"key":"#cr-split#-7_CR10.2","unstructured":"The earlier version appeared in: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 81\u201399. Springer, Heidelberg (2002)"},{"key":"7_CR11","unstructured":"Hara, Y., Seito, T., Shikata, J., Matsumoto, T.: Unconditionally secure blind signatures. In: Proc. of International Conference on Information Theoretic Security (ICITS 2007), Madrid, Spain, May 2007, pp. 25\u201344 (2007)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/BFb0052233","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"A. Juels","year":"1997","unstructured":"Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 150\u2013164. Springer, Heidelberg (1997)"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1006\/inco.1998.2767","volume":"151","author":"T. Johansson","year":"1999","unstructured":"Johansson, T.: Further results on asymmetric authentication schemes. Information and Computation\u00a0151, 100\u2013133 (1999)","journal-title":"Information and Computation"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/3-540-48658-5_16","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"K. Kurosawa","year":"1994","unstructured":"Kurosawa, K.: New bound on authentication code with arbitration. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 140\u2013149. Springer, Heidelberg (1994)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-49264-X_23","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"K. Kurosawa","year":"1995","unstructured":"Kurosawa, K., Obana, S.: Combinatorial bounds for authentication codes with arbitration. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 289\u2013300. Springer, Heidelberg (1995)"},{"key":"#cr-split#-7_CR16.1","doi-asserted-by":"crossref","unstructured":"Namprempre, C., Neven, G., Abdalla, M.: A study of blind message authentication codes. IEICE Trans. Fundamentals 1973\u00a0E90-A(1), 75\u201382 (2007);","DOI":"10.1093\/ietfec\/e90-a.1.75"},{"key":"#cr-split#-7_CR16.2","unstructured":"The earlier version appeared in: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 262\u2013279. Springer, Heidelberg (2006)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/BFb0028468","volume-title":"Information and Communications Security","author":"S. Obana","year":"1997","unstructured":"Obana, S., Kurosawa, K.: A2-code = affine resolvable + BIBD. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 118\u2013129. Springer, Heidelberg (1997)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/11681878_5","volume-title":"Theory of Cryptography","author":"T. Okamoto","year":"2006","unstructured":"Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 80\u201399. Springer, Heidelberg (2006)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-39200-9_6","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"B. Pinkas","year":"2003","unstructured":"Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 87\u2013105. Springer, Heidelberg (2003)"},{"key":"7_CR20","unstructured":"Pinto, A., Souto, A., Matos, A., Antunes, L.: Commitment and authentication systems. In: Proc. of International Conference on Information Theoretic Security (ICITS 2007), Madrid, Spain (May 2007)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/BFb0054141","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"D. Pointcheval","year":"1998","unstructured":"Pointcheval, D.: Strengthened security for blind signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 391\u2013405. Springer, Heidelberg (1998)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0034852","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Provably secure blind signature schemes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 252\u2013265. Springer, Heidelberg (1996)"},{"key":"7_CR23","first-page":"92","volume-title":"ACM CCS","author":"D. Pointcheval","year":"1997","unstructured":"Pointcheval, D., Stern, J.: New blind signatures equivalent to factorization. In: ACM CCS, pp. 92\u201399. ACM Press, New York (1997)"},{"issue":"3","key":"7_CR24","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology\u00a013(3), 361\u2013396 (2000)","journal-title":"J. Cryptology"},{"key":"7_CR25","unstructured":"Rivest, R.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer (1999) (manuscript), http:\/\/people.csail.mit.edu\/rivest\/Rivest-commitment.pdf"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secret systems. Bell Syst. Tech.J.\u00a028, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech.J."},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/3-540-46035-7_29","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Shikata","year":"2002","unstructured":"Shikata, J., Hanaoka, G., Zheng, Y., Imai, H.: Security notions for unconditionally secure signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 434\u2013449. Springer, Heidelberg (2002)"},{"issue":"5","key":"7_CR28","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput.\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/3-540-39118-5_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"G.J. Simmons","year":"1988","unstructured":"Simmons, G.J.: Message authentication with arbitration of transmitter\/receiver disputes. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 151\u2013165. Springer, Heidelberg (1988)"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G.J. Simmons","year":"1990","unstructured":"Simmons, G.J.: A Cartesian construction for unconditionally secure authentication codes that permit arbitration. J. Cryptology\u00a02, 77\u2013104 (1990)","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Formal to Practical Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02002-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:45:20Z","timestamp":1558302320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02002-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020018","9783642020025"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02002-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}