{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:07:50Z","timestamp":1778789270406,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642125096","type":"print"},{"value":"9783642125102","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_15","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"209-222","source":"Crossref","is-referenced-by-count":22,"title":["Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings"],"prefix":"10.1007","author":[{"given":"Lejla","family":"Batina","sequence":"first","affiliation":[]},{"given":"Jaap-Henk","family":"Hoepman","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Wojciech","family":"Mostowski","sequence":"additional","affiliation":[]},{"given":"Pim","family":"Vullers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"Selected Areas in Cryptography","author":"P. Barreto","year":"2006","unstructured":"Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 319\u2013331. Springer, Heidelberg (2006)"},{"key":"15_CR2","volume-title":"LMS","author":"I. Blake","year":"2005","unstructured":"Blake, I., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. In: LMS, vol.\u00a0317. Cambridge Univ. Press, Cambridge (2005)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"issue":"4","key":"15_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology\u00a017(4), 297\u2013319 (2004)","journal-title":"Journal of Cryptology"},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"S. Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Computer and Communications Security - CCS 2004","author":"E.F. Brickell","year":"2004","unstructured":"Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Pfitzmann, B., Liu, P. (eds.) Computer and Communications Security - CCS 2004, pp. 132\u2013145. ACM Press, New York (2004)"},{"key":"15_CR7","unstructured":"BSI: Advanced security mechanisms for machine readable travel documents \u2013 Extended Access Control (EAC). Tech. Rep. TR-03110, German Federal Office for Information Security, BSI (2008)"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/586110.586114","volume-title":"Computer and Communications Security - CCS 2002","author":"J. Camenisch","year":"2002","unstructured":"Camenisch, J., van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Computer and Communications Security - CCS 2002, pp. 21\u201330. ACM, New York (2002)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology - CRYPTO 1982, pp. 199\u2013203. Plenum Press, New York (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"15_CR11","series-title":"Java Series","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Java Series. Addison-Wesley, Reading (2000)"},{"key":"15_CR12","unstructured":"Danes, L.: Smart card integration in the pseudonym system idemix. Master\u2019s thesis, University of Groningen, The Netherlands (2007)"},{"key":"15_CR13","unstructured":"ECRYPTII: Yearly report on algorithms and keysizes (2008-2009). Tech. Rep. D.SPA.7, European Network of Excellence in Cryptology II (ECRYPTII) (2009)"},{"key":"15_CR14","volume-title":"Data Protection in a Profiled World - CPDP 2008","author":"B. Jacobs","year":"2010","unstructured":"Jacobs, B.: Architecture is politics: Security and privacy issues in transport and beyond. In: Gutwirth, S., Poullet, Y., Hert, P. (eds.) Data Protection in a Profiled World - CPDP 2008. Springer, Heidelberg (2010)"},{"key":"15_CR15","unstructured":"Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). Tech. Rep. CORR 99-34, Department of Combinatorics & Optimization, University of Waterloo, Canada (2000)"},{"issue":"4","key":"15_CR16","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A. Joux","year":"2004","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology\u00a017(4), 263\u2013276 (2004)","journal-title":"Journal of Cryptology"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/ISI.2008.4565060","volume-title":"Intelligence and Security Informatics - ISI 2008","author":"S. Kiyomoto","year":"2008","unstructured":"Kiyomoto, S., Tanaka, T.: Anonymous attribute authentication scheme using self-blindable certificates. In: Intelligence and Security Informatics - ISI 2008, pp. 215\u2013217. IEEE, Los Alamitos (2008)"},{"key":"15_CR18","unstructured":"NXP: Smart solutions for smart services (z-card 2009). NXP Literature, Document 75016728 (2009)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72354-7_11","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"P. Paradinas","year":"2007","unstructured":"Paradinas, P., Cordry, J., Bouzefrane, S.: Performance evaluation of Java Card bytecodes. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 127\u2013137. Springer, Heidelberg (2007)"},{"key":"15_CR20","series-title":"LMS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1017\/CBO9780511546570.003","volume-title":"Advances in Elliptic Curve Cryptography","author":"N. Smart","year":"2005","unstructured":"Smart, N.: Elliptic curve based protocols. In: Blake, I., Seroussi, G., Smart, N. (eds.) Advances in Elliptic Curve Cryptography. LMS, vol.\u00a0317, pp. 3\u201319. Cambridge Univ. Press, Cambridge (2005)"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/WIFS.2009.5386474","volume-title":"Information Forensics and Security \u2013 WIFS 2009","author":"M. Sterckx","year":"2009","unstructured":"Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on Java Card smart cards. In: Information Forensics and Security \u2013 WIFS 2009, pp. 106\u2013110. IEEE, Los Alamitos (2009)"},{"key":"15_CR22","unstructured":"Sun Microsystems, Inc.: Java Card 2.2.2 Application Programming Interface Specification (2006)"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-642-03944-7_8","volume-title":"Information Security Theory and Practice - WISTP 2009","author":"H. Tews","year":"2009","unstructured":"Tews, H., Jacobs, B.: Performance issues of selective disclosure and blinded issuing protocols on java card. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C., Quisquater, J.J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 95\u2013111. Springer, Heidelberg (2009)"},{"key":"15_CR24","series-title":"CIS","first-page":"13","volume-title":"Identity-Based Cryptography","author":"F. Vercauteren","year":"2009","unstructured":"Vercauteren, F.: Pairings on elliptic curves. In: Joye, M., Neven, G. (eds.) Identity-Based Cryptography. CIS, vol.\u00a02, pp. 13\u201330. IOS Press, Amsterdam (2009)"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45682-1_31","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Verheul","year":"2001","unstructured":"Verheul, E.: Self-blindable credential certificates from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 533\u2013550. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:14Z","timestamp":1619782934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}