{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:04:55Z","timestamp":1725465895079},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540601760"},{"type":"electronic","value":"9783540447177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0053432","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T00:05:50Z","timestamp":1149638750000},"page":"156-170","source":"Crossref","is-referenced-by-count":13,"title":["Methodology for digital money based on general cryptographic tools"],"prefix":"10.1007","author":[{"given":"Stefano","family":"D'Amiano","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Di Crescenzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"issue":"no.6","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"M. Blum","year":"1991","unstructured":"M. Blum, A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero-Knowledge, SIAM Journal of Computing, vol. 20, no. 6, Dec 1991, pp. 1084\u20131118.","journal-title":"SIAM Journal of Computing"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, and S. Micali, Non-Interactive Zero-Knowledge and Applications, Proceedings of the 20th ACM Symposium on Theory of Computing, 1988, pp. 103\u2013112.","DOI":"10.1145\/62212.62222"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"S. Brands, Untraceable Off-line Cash in Wallets with Observers, in \u201cAdvances in Cryptology \u2014 CRYPTO 93\u201d, vol. 773 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 302\u2013318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, in \u201cAdvances in Cryptology \u2014 CRYPTO 88\u201d, vol. 403 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen, Transferred Cash Grows in Size, in \u201cAdvances in Cryptology \u2014 Eurocrypt 92\u201d, vol. 658 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 390\u2013407.","DOI":"10.1007\/3-540-47555-9_32"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"A. De Santis and G. Persiano, Communication Efficient Zero-Knowledge Proof of knowledge (with Application to Electronic Cash), in Proceedings of STACS 92, pp. 449\u2013460.","DOI":"10.1007\/3-540-55210-3_204"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"A. De Santis and G. Persiano, Zero-Knowledge Proofs of Knowledge Without Interaction, Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, 1992, pp. 427\u2013436.","DOI":"10.1109\/SFCS.1992.267809"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"G. Di Crescenzo, A Non-Interactive Electronic Cash System, in Proceedings of Italian Conference on Algorithms and Complexity (CIAC 94), Springer Verlag.","DOI":"10.1007\/3-540-57811-0_10"},{"key":"14_CR9","unstructured":"G. Di Crescenzo, Anonymous NIZK Proofs of Knowledge with Preprocessing, manuscript."},{"issue":"no.6","key":"14_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE Transaction on Information Theory, vol. IT-22, no. 6, Nov. 1976. pp.644\u2013654.","journal-title":"IEEE Transaction on Information Theory"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir, Zero-knowledge Proofs of Identity, Journal of Cryptology, vol. 1, 1988, pp. 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"N. Ferguson, Single Term Off-Line Coins, in \u201cAdvances in Cryptology \u2014 Eurocrypt 93\u201d, vol. 765 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 318\u2013328.","DOI":"10.1007\/3-540-48285-7_28"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Yung, Secure and Efficient Off-Line Digital Money, in Proceedings of ICALP 93, vol. 700 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 265\u2013276.","DOI":"10.1007\/3-540-56939-1_78"},{"issue":"no.4","key":"14_CR14","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the Association for Computing Machinery, vol. 33, no. 4, 1986, pp. 792\u2013807.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM Journal on Computing, vol. 18, n. 1, February 1989.","DOI":"10.1137\/0218012"},{"issue":"n.2","key":"14_CR16","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attack, SIAM Journal of Computing, vol. 17, n. 2, April 1988, pp. 281\u2013308.","journal-title":"SIAM Journal of Computing"},{"key":"14_CR17","unstructured":"S. Goldwasser and R. Ostrovsky, Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent, in \u201cAdvances in Cryptology \u2014 CRYPTO 92\u201d, vol. 470 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 246\u2013259."},{"key":"14_CR18","unstructured":"M. Naor, Bit Commitment using Pseudo-randomness, in \u201cAdvances in Cryptology \u2014 CRYPTO 89\u201d, vol. 435 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag."},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Universal One-way Hash Functions and their Cryptographic Applications, Proceedings of 21st ACM Symposium on the Theory of Computing, 1989.","DOI":"10.1145\/73007.73011"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, Universal Electronic Cash, in \u201cAdvances in Cryptology \u2014 CRYPTO 91\u201d, vol. 576 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 324\u2013337.","DOI":"10.1007\/3-540-46766-1_27"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, Disposable Zero-knowledge Authentications and their Applications to Untraceable Electronic Cash, in \u201cAdvances in Cryptology \u2014 CRYPTO 89\u201d, vol. 435 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 481\u2013496.","DOI":"10.1007\/0-387-34805-0_43"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"J. Rompel, One-way Functions are Necessary and Sufficient for Secure Signatures, Proceedings of the 22nd ACM Symposium on Theory of Computing, 1990, pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"M. Tompa and H. Woll, Random Self-Reducibility and Zero-knowledge Interactive Proofs of Possession of Information, Proceedings of 28th Symposium on Foundations of Computer Science, 1987, pp. 472\u2013482.","DOI":"10.1109\/SFCS.1987.49"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T02:22:05Z","timestamp":1555640525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540601760","9783540447177"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/bfb0053432","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}