{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:12Z","timestamp":1772283612493,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540633846","type":"print"},{"value":"9783540695288","type":"electronic"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052233","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T14:37:31Z","timestamp":1155825451000},"page":"150-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":148,"title":["Security of blind digital signatures"],"prefix":"10.1007","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[]},{"given":"Michael","family":"Luby","sequence":"additional","affiliation":[]},{"given":"Rafail","family":"Ostrovsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"key":"10_CR1","unstructured":"S.A. Brands. Untraceable Off-line Electronic Cash Based on Secret-key Certificates. Latin 95."},{"key":"10_CR2","unstructured":"M. Bellare and S. Micali. \u201cHow to Sign Given Any Trapdoor Function\u201d. STOC 88."},{"key":"10_CR3","unstructured":"M. Bellare and S. Goldwasser. \u201cNew Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs\u201d. Crypto 89."},{"key":"10_CR4","unstructured":"M. Bellare and P. Rogaway. \u201cThe Exact Security of Digital Signatures \u2014 How to Sign with RSA and Rabin\u201d. Eurocrypt-96."},{"key":"10_CR5","unstructured":"R. Canetti \u201cDe-mystifying Random Oracles\u201d CRYPTO-97 (this proceedings)."},{"key":"10_CR6","unstructured":"D. Chaum. \u201cBlind Signatures for Untraceable Payments\u201d. Crypto-82."},{"key":"10_CR7","unstructured":"D. Chaum, A. Fiat, and M. Naor. \u201cUntraceable Electronic Cash\u201d, Crypto-89."},{"key":"10_CR8","unstructured":"C. Dwork and M. Naor. \u201cAn Efficient Existentially Unforgeable Signature Scheme and its Applications\u201d. Crypto 94."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. \u201cNew Directions in Cryptography\u201d. IEEE Trans. on Inf. Theory, IT-22, pp. 644\u2013654, 1976.","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"10_CR10","unstructured":"A. Fiat and A. Shamir. \u201cHow to Prove Yourself: Practical Solutions of Identification and Signature Problems, CRYPTO 86."},{"key":"10_CR11","unstructured":"O. Goldreich. \u201cTwo Remarks Concerning the GMR Signature Scheme\u201d MIT Tech. Report 715, 1986. CRYPTO 86."},{"issue":"No4","key":"10_CR12","first-page":"792","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. \u201cHow to Construct Random Functions\u201d. JASM V. 33 No 4. (October 1986) pp. 792\u2013807.","journal-title":"JASM"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff, \u201cThe Knowledge Complexity of Interactive Proof-Systems\u201d. SIAM J. Comput. 18 (1989), pp. 186\u2013208; (also in STOC 85, pp. 291\u2013304.)","journal-title":"SIAM J. Comput."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. \u201cHow to Play Any Mental Game\u201d. Proc. of 19th STOC, pp. 218\u2013229, 1987.","DOI":"10.1145\/28395.28420"},{"issue":"No2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. \u201cA Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks\u201d. SIAM Journal of Computing Vol. 17, No 2, (April 1988), pp. 281\u2013308.","journal-title":"SIAM Journal of Computing"},{"key":"10_CR16","unstructured":"Goldwasser S., and R. Ostrovsky \u201cInvariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent\u201d CRYPTO 92."},{"key":"10_CR17","unstructured":"L.C. Guillou and J.J. Quisquater. \u201cA Practical Zero-Knowledge Protocol Fitter to Security Microprocessor Minimizing Both Transmission and Memory\u201d. EUROCRYPT 88."},{"key":"10_CR18","unstructured":"M. Naor. \u201cBit Commitment Using Pseudo-Randomness\u201d. Crypto-89."},{"key":"10_CR19","unstructured":"M. Naor and M. Yung. \u201cUniversal One-Way Hash Functions and their Cryptographic Applications\u201d. STOC 89."},{"key":"10_CR20","unstructured":"T. Okamoto. \u201cProvably Secure and Practical Identification Schemes and Corresponding Signature Schemes\u201d CRYPTO 92."},{"key":"10_CR21","unstructured":"D. Pointcheval and J. Stern. \u201cSecurity Proofs for Signature Schemes\u201d. Eurocrypt 96."},{"key":"10_CR22","unstructured":"D. Pointcheval and J. Stern. \u201cProvably Secure Blind Signature Schemes\u201d. Asiacrypt 96."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman. \u201cA Method for Obtaining Digital Signatures and Public Key Cryptosystems\u201d. Comm. ACM, Vol 21, No 2, 1978.","DOI":"10.1145\/359340.359342"},{"key":"10_CR24","unstructured":"J. Rompel. \u201cOne-way Functions are Necessary and Sufficient for Secure Signatures\u201d. STOC 90."},{"key":"10_CR25","unstructured":"C.P. Schnorr. \u201cEfficient Identification and Signatures for Smart Cards\u201d. CRYPTO 89."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"A. C. Yao. \u201cHow to Generate and Exchange Secrets\u201d. Proc. of 27th FOCS, 1986, pp. 162\u2013167.","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '97"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T22:29:33Z","timestamp":1580336973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052233"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540633846","9783540695288"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/bfb0052233","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"17 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}