{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:45:50Z","timestamp":1750337150081},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028168","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T01:50:22Z","timestamp":1132624222000},"page":"177-190","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["How to convert any digital signature scheme into a group signature scheme"],"prefix":"10.1007","author":[{"given":"Holger","family":"Petersen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"14_CR1","unstructured":"S.Brands, \u201c'Untraceable Off-Line Cash in Wallets with Observers\u201d', Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto '93, Springer, (1994), pp. 302\u2013318."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"J.Camenisch, \u201c'Efficient and Generalized Group signatures\u201d', to appear in Lecture Notes in Computer Science, Advances in Cryptology: Proc. Eurocrypt'97, Springer, (1997), 12 pages.","DOI":"10.1007\/3-540-69053-0_32"},{"key":"14_CR3","unstructured":"D.Chaum, E.van Heijst, \u201cGroup signatures\u201d, Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt '91, Springer, (1992), pp. 257\u2013265."},{"key":"14_CR4","unstructured":"D.Chaum, T.Pedersen, \u201cWallet databases with observers\u201d, Lecture Notes in Computer Science 740, Advances in Cryptology: Proc. Crypto'92, (1993), pp. 89\u2013105."},{"key":"14_CR5","unstructured":"L.Chen, T.Pedersen, \u201cNew Group Signature Schemes\u201d, Lecture Notes in Computer Science 950, Advances in Cryptology: Proc. Eurocrypt'94, Springer, (1995), pp. 163\u2013173."},{"key":"14_CR6","unstructured":"L.Chen, T.Pedersen, \u201cOn the Efficiency of Group Signatures Providing Information-Theoretic Anonymity\u201d, Lecture Notes in Computer Science 921, Advances in Cryptology: Proc. Eurocrypt'95, Springer, (1995), pp. 39\u201349."},{"key":"14_CR7","unstructured":"R.Cramer, I.Damgard, B.Schoenmakers, \u201cProofs of Partial Knowledge and Simplifies Designs of Witness Hiding Protocols\u201d, Lecture Notes in Computer Science 839, Advances in Cryptology: Proc. Crypto'94, Springer, (1994), pp. 174\u2013187."},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-30","author":"T. ElGamal","year":"1985","unstructured":"T.ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms\u201d, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July, (1985), pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR9","unstructured":"U.Feige, A.Shamir, \u201c'Witness indistinguishable and witness hiding protocols\u201d', Proc. of the 22nd Annual ACM Symposium on the Theory of Computing, ACM Press, (1990), pp. 416\u2013426."},{"key":"14_CR10","unstructured":"A.Fiat, A.Shamir, \u201cHow to prove yourself: Practical solutions to identification and signature problems\u201d, Advances in Cryptology: Proc. Crypto'86, Lecture Notes in Computer Science 263, Springer, (1987), pp. 186\u2013194."},{"key":"14_CR11","unstructured":"Y.Frankel, Y.Tsiounis, M.Yung, \u201c \u2018\u201cIndirect Discourse Proofs\u201d: Achieving Efficient Fair Off Line E-Cash\u201d', Lecture Notes in Computer Science 1163, Advances in Cryptology: Proc. Asiacrypt'96, Springer, (1996), pp. 286\u2013300."},{"key":"14_CR12","unstructured":"R.Gennaro, S.Jarecki, H.Krawczyk, T.Rabin, \u201cRobust Threshold DSS Signatures\u201d, Advances in Cryptology: Proc. Eurocrypt'96, Lecture Notes in Computer Science 1070, Springer, (1996), pp. 354\u2013371."},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S.Goldwasser, S.Micali, R.Rivest, \u201cA secure digital signature scheme\u201d, SIAM Journal on Computing, Vol. 17, 2, (1988), pp. 281\u2013308.","journal-title":"SIAM Journal on Computing"},{"key":"14_CR14","unstructured":"S.J.Kim, S.J.Park, D.H.Won, \u201cConvertible Group Signatures\u201d, Lecture Notes in Computer Science 1163, Advances in Cryptology: Proc. Asiacrypt'96, (1996), pp. 311\u2013321."},{"key":"14_CR15","unstructured":"M.Michels, \u201cComments on some group signature schemes\u201d, Technical Report TR-96-03, University of Technology Chemnitz-Zwickau, November, (1996), 4 pages, available at http:\/\/www.tu-chemnitz.de\/~hpe\/techrep.html."},{"key":"14_CR16","unstructured":"T.Okamoto, \u201cProvable secure and practical identification schemes and corresponding signature schemes\u201d, Lecture Notes in Computer Science 740, Advances in Cryptology: Proc. Crypto '92, (1993), pp. 31\u201353."},{"issue":"1","key":"14_CR17","first-page":"86","volume":"E79-A","author":"C. Park","year":"1996","unstructured":"C.Park, K.Kurosawa, \u201cNew ElGamal Type Threshold Digital Signature Scheme\u201d, IEICE Trans. Fundamentals. Vol. E79-A, No. 1, January, (1996), pp. 86\u201393.","journal-title":"IEICE Trans. Fundamentals"},{"key":"14_CR18","unstructured":"T.Pedersen, \u201c'A threshold Cryptosystem without a Trusted Party\u201d', Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt'91, Springer, (1992), pp. 522\u2013526."},{"key":"14_CR19","unstructured":"B.Schoenmakers, \u201cEfficient proofs of OR\u201d, manuscript, (1993), 3 pages."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:06:10Z","timestamp":1558256770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/bfb0028168","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"15 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}