{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T06:28:29Z","timestamp":1751869709030},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540601760"},{"type":"electronic","value":"9783540447177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0053446","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T04:05:50Z","timestamp":1149653150000},"page":"306-319","source":"Crossref","is-referenced-by-count":39,"title":["Single-term divisible electronic coins"],"prefix":"10.1007","author":[{"given":"Tony","family":"Eng","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Brands, S., \u201cUntraceable Off-line Cash in Wallet with Observers\u201d, Proceedings of the Crypto 93, pp.302\u2013318 (1994).","key":"28_CR1","DOI":"10.1007\/3-540-48329-2_26"},{"issue":"10","key":"28_CR2","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D., \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete,\u201d Comm. of the ACM, 28, 10, pp.1030\u20131044 (1985).","journal-title":"Comm. of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D., Fiat, A., and Naor, M., \u201cUntraceable Electronic Cash,\u201d Proceedings of the Crypto 88, pp.319\u2013327 (1990).","key":"28_CR3","DOI":"10.1007\/0-387-34799-2_25"},{"doi-asserted-by":"crossref","unstructured":"De Santis, A. and Persiano, G., \u201cCommunication Efficient Zero-Knowledge Proofs of Knowledge (with Applications to Electronic Cash)\u201d Proceedings of STACS 92, pp. 449\u2013460 (1992).","key":"28_CR4","DOI":"10.1007\/3-540-55210-3_204"},{"doi-asserted-by":"crossref","unstructured":"Ferguson, N., \u201cSingle Term Off-line Coins\u201d, Proceedings of the Eurocrypt 93, pp.318\u2013328 (1994).","key":"28_CR5","DOI":"10.1007\/3-540-48285-7_28"},{"doi-asserted-by":"crossref","unstructured":"Franklin, M. and Yung, M., \u201cSecure and Efficient Off-Line Digital Money\u201d, Proceedings of ICALP 93, pp. 449\u2013460 (1993).","key":"28_CR6","DOI":"10.1007\/3-540-56939-1_78"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., and Micali, S., \u201cHow to Construct Random Functions,\u201d Journal of ACM, Vol.33, No.4 (1986).","key":"28_CR7","DOI":"10.1145\/6490.6503"},{"doi-asserted-by":"crossref","unstructured":"Okamoto, T., \u201cProvably Secure and Practical Identification Schemes and Corresponding Signature Schemes\u201d, Proceedings of the Crypto 92, pp. 31\u201353 (1993).","key":"28_CR8","DOI":"10.1007\/3-540-48071-4_3"},{"doi-asserted-by":"crossref","unstructured":"Okamoto, T., and Ohta, K., \u201cDisposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash\u201d, Proceedings of the Crypto 89, pp. 481\u2013496 (1990).","key":"28_CR9","DOI":"10.1007\/0-387-34805-0_43"},{"doi-asserted-by":"crossref","unstructured":"Okamoto, T., and Ohta, K., \u201cUniversal Electronic Cash\u201d, Proceedings of the Crypto 91, pp. 324\u2013337 (1992).","key":"28_CR10","DOI":"10.1007\/3-540-46766-1_27"},{"doi-asserted-by":"crossref","unstructured":"J.C. Pailles, \u201cNew Protocols for Electronic Money\u201d, Proceedings of the Auscrypt 92, pp. 263\u2013274 (1993).","key":"28_CR11","DOI":"10.1007\/3-540-57220-1_68"},{"issue":"No.3","key":"28_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P., \u201cEfficient Signature Generation by Smart Cards\u201d, Journal of Cryptology, Vol. 4, No. 3, pp.161\u2013174 (1991).","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,7]],"date-time":"2023-05-07T17:01:10Z","timestamp":1683478870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540601760","9783540447177"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0053446","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}