{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:00Z","timestamp":1725454320264},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000431","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"151-163","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Efficient electronic money"],"prefix":"10.1007","author":[{"given":"Yacov","family":"Yacobi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"12_CR1","unstructured":"S. Brand Electronic Cash Systems Based On The Representation Problem In Groups Of Prime Order, Proceedings of Crypto'93, Santa Barbara 1993, pp. 26.1\u201326.15."},{"key":"12_CR2","unstructured":"E.F. Brickell, D. Chaum, I.B. Damgard, and J. van de Graaf Gradual and Verifiable Release of a Secret, Proc. Crypto'87."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"D. Chaum Achieving Electronic Privacy Scientific American, August 1992, pp. 96\u2013101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"12_CR4","unstructured":"D. Chaum, A. Fiat, M. Naor Untraceable Electronic Cash, Proc. Crypto 1988."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"W. Diffie, M. Hellman New Directions in Cryptography IEEE Trans. IT. 1976","DOI":"10.1109\/TIT.1976.1055638"},{"issue":"No.4","key":"12_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. IT, Vol. IT-31, No. 4, July 1985, pp. 469\u2013472.","journal-title":"IEEE Trans. IT"},{"key":"12_CR7","unstructured":"S. Even, O. Goldreich, Y. Yacobi, Electronic Wallet, Proc. Crypto'83. A later version appeared in Proc. 1984 International Zurich Seminar on Digital Communications, pp. 199\u2013201, IEEE cat No. 84CH1998-4."},{"key":"12_CR8","unstructured":"T. Eng, T. Okamoto, Single-Term Divisible Electronic Coins, Proc. Eurocrypt'94, pp. 311\u2013323."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"M. Franklin, M. Yung, Secure and Efficient Off-Line Digital Money, Proc. ICALP 93, pp. 449\u2013460 (1993)","DOI":"10.1007\/3-540-56939-1_78"},{"key":"12_CR10","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1145\/116825.116852","volume":"38","author":"Goldreich","year":"1991","unstructured":"Goldreich, Micali, and Wigderson Proofs that yield nothing, but their validity, or All languages in NP have zero-knowledge proof systems. J. of the ACM, 38: 691\u2013729, 1991.","journal-title":"J. of the ACM"},{"issue":"1","key":"12_CR11","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"Goldwasser","year":"1989","unstructured":"Goldwasser, Micali, and Rackoff, The knowledge complexity of Interactive proof systems, SIAM J. on Computing, 181, 1989, pp. 186\u2013208.","journal-title":"SIAM J. on Computing"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Ohta, Disposable Zero-Knowledge Authentication and Their Application to Untraceable Electronic Cash, Proc. Crypto'89, pp. 481\u2013496 (Springer-Verlag, LNCS 435, G. Brassard Ed.)","DOI":"10.1007\/0-387-34805-0_43"},{"key":"12_CR13","volume-title":"Foundations of secure computation","author":"M.O. Rabin","year":"1978","unstructured":"M.O. Rabin, Digitalized signatures, in Foundations of secure computation, Academic Press, NY, 1978."},{"key":"12_CR14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adelman A method for obtaining digital signatures and public key cryptosystems, CACM, vol. 21, 1978, pp. 120\u2013126.","journal-title":"CACM"},{"key":"12_CR15","unstructured":"Y. Yacobi, Efficient Non-Traceable Digital Checks, Witnessed and signed Bellcore Lab-Notebook, pp. 49\u201353, June 17, 1992."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T21:18:57Z","timestamp":1578518337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000431"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0000431","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"8 September 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}