{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:22:22Z","timestamp":1743085342497,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_6","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"99-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Private eCash in Practice (Short Paper)"],"prefix":"10.1007","author":[{"given":"Amira","family":"Barki","sequence":"first","affiliation":[]},{"given":"Solenn","family":"Brunet","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Desmoulins","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[]},{"given":"Sa\u00efd","family":"Gharout","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Traor\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/BFb0034851","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 1996","author":"M Abe","year":"1996","unstructured":"Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244\u2013251. Springer, Heidelberg (1996). doi:10.1007\/BFb0034851"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Arfaoui, G., Lalande, J., Traor\u00e9, J., Desmoulins, N., Berthom\u00e9, P., Gharout, S.: A practical set-membership proof for privacy-preserving NFC mobile ticketing. In: Proceedings on Privacy Enhancing Technologies abs\/1505.03048 (2015)","DOI":"10.1515\/popets-2015-0019"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TVT.2013.2274288","volume":"63","author":"MH Au","year":"2014","unstructured":"Au, M.H., Liu, J., Fang, J., Jiang, Z., Susilo, W., Zhou, J.: A new payment system for enhancing location privacy of electric vehicles. IEEE Trans. Veh. Technol. 63(1), 3\u201318 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR4","unstructured":"Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: PrETP: privacy-preserving electronic toll pricing. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 5 (2010)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chase, M., Meiklejohn, S., Zaverucha, G.: Algebraic MACs and keyed-verification anonymous credentials. In: Proceedings of the 2014 ACM SIGSAC CCS, CCS 2014, pp. 1205\u20131216. ACM, New York (2014)","DOI":"10.1145\/2660267.2660328"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, New York (1983)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Day, J., Huang, Y., Knapp, E., Goldberg, I.: SPEcTRe: spot-checked private ecash tolling at roadside. In: WPES, pp. 61\u201368. ACM (2011)","DOI":"10.1145\/2046556.2046565"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-45472-1_7","volume-title":"Financial Cryptography","author":"P-A Fouque","year":"2001","unstructured":"Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90\u2013104. Springer, Heidelberg (2001). doi:10.1007\/3-540-45472-1_7"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-73489-5_14","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"E Hufschmitt","year":"2007","unstructured":"Hufschmitt, E., Traor\u00e9, J.: Fair blind signatures revisited. In: Takagi, T., Okamoto, E., Okamoto, T., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 268\u2013292. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73489-5_14"},{"key":"6_CR10","unstructured":"Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H.: The phantom tollbooth: privacy-preserving electronic toll collection in the presence of driver collusion. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 32 (2011)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-20810-7_9","volume-title":"Data and Applications Security and Privacy XXIX","author":"M Milutinovic","year":"2015","unstructured":"Milutinovic, M., Decroix, K., Naessens, V., De Decker, B.: Privacy-preserving public transport ticketing system. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 135\u2013150. Springer, Cham (2015). doi:10.1007\/978-3-319-20810-7_9"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-29485-8_7","volume-title":"Topics in Cryptology \u2013 CT-RSA 2016","author":"D Pointcheval","year":"2016","unstructured":"Pointcheval, D., Sanders, O.: Short randomizable signatures. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 111\u2013126. Springer, Cham (2016). doi:10.1007\/978-3-319-29485-8_7"},{"key":"6_CR13","unstructured":"Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: protecting privacy in location-based vehicular services. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 335\u2013350 (2009)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-39884-1_17","volume-title":"Financial Cryptography and Data Security","author":"A Rupp","year":"2013","unstructured":"Rupp, A., Hinterw\u00e4lder, G., Baldimtsi, F., Paar, C.: P4R: privacy-preserving pre-payments with refunds for transportation systems. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 205\u2013212. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39884-1_17"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:49:17Z","timestamp":1712076557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}