{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:11Z","timestamp":1763467751330},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055469","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"1-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Micro-payments via efficient coin-flipping"],"prefix":"10.1007","author":[{"given":"Richard J.","family":"Lipton","sequence":"first","affiliation":[]},{"given":"Rafail","family":"Ostrovsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"R. Anderson, C. Manifavas, C. Sutherland \u201cNetcard \u2014 a practical electronic cash system\u201d In Fourth Cambridge Workshop on Security Protocols. Springer Verlag, Lecture Notes in Computer Science, April 1996. available online URL http:\/\/www.cl.cam.ac.uk\/users\/rja14\/","DOI":"10.1007\/3-540-62494-5_4"},{"key":"1_CR2","unstructured":"Blum, M., \u201cCoin Flipping over the Telephone,\u201d IEEE COMPCON 1982, pp. 133\u2013137."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum, and S. Micali \u201cHow to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits\u201d SIAM J. on Computing, Vol 13, 1984, pp. 850\u2013864, FOCS 82.","journal-title":"SIAM J. on Computing"},{"key":"1_CR4","unstructured":"J.P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mj\u00d8lsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, L. Vall\u00e9e, and M. Waidner."},{"key":"1_CR5","unstructured":"M. Bellare and O. Goldreich. \u201cOn defining proofs of knowledge.\u201d Extended abstract in Advances in Cryptology \u2014 Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed, Springer-Verlag, 1993."},{"key":"1_CR6","unstructured":"B. Cox, D. Tygar, M. Sirbu \u201cNetBill security and transaction proptocol\u201d First USENIX Workshop on Electronic Commerce, New York, July 1995. available online URL http:\/\/www.ini.cmu\/NETBILL\/home.html"},{"key":"1_CR7","unstructured":"L. Tang and S. Low \u201cChrg-http: A Tool for Micropayments on the World Wide Web\u201d 6th USENIX Security Symposium, San Jose, CA July 1996."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum \u201cAchieving Electronic Privacy\u201d Scientific American, pp. 96\u2013101, August 1992.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"1_CR9","unstructured":"D. Chaum, A. Fiat, M. Naor \u201cUntracable electronic Cash\u201d Crypto-89."},{"key":"1_CR10","unstructured":"E. Gabber and A. Silberschatz \u201cAgora: A Minimal Distributed Protocol for Electronic Commerce\u201d USENIX Workshop on E-Commerce, Oakland CA Nov. 1996."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"S. Glassman, M. Manasse, M. Abadai, P. Gauthier, and P. Sobalvarro \u201cThe milicent protocol for inexpensive electronic commerce\u201d In Proc. of the forth International World Wide Web Conference\u201d, 1995. available online URL http:\/\/www.research.digital.com\/SRC\/milicent","DOI":"10.1145\/3592626.3592675"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest \u201cA Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks\u201d. SIAM Journal of Computing vol 17, No 2, (April 1988), pp. 281\u2013308.","journal-title":"SIAM Journal of Computing"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"O. Goldreich, L. Levin \u201cA hard-core predicate for all one-way functions.\u201d In Porc. of 21st STOC, pp. 25\u201332 ACM 1989.","DOI":"10.1145\/73007.73010"},{"key":"1_CR14","unstructured":"N. M. Haller \u201cThe S\/KEY one-time password system. In ISOC 94."},{"key":"1_CR15","unstructured":"R. Hauser, M. Steiner, M. Waidner \u201cMicro-payments based on ikp\u201d In 14th Worldwide Congress on Computer and Communication Security Protection, CNIT Paris-La defense France, June 1996. available online URL http:\/\/www.zurich.ibm.com.\/Technology\/Security\/publications\/1996\/HSW96-new.ps.gz"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"S. Jarecki, A. Adlyzko \u201cAn efficient micropayment system based on probabilistic polling\u201d Conference proceedings of Financial Cryptography'97, February 1997, Anguilla, BWI.","DOI":"10.1007\/3-540-63594-7_77"},{"issue":"11","key":"1_CR17","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport \u201cPassword authentication with insecure communication\u201d Communications of the ACVM, 24(11):770\u2013771, November 1981.","journal-title":"Communications of the ACVM"},{"key":"1_CR18","unstructured":"Mondex USA available online URL http:\/\/www2.mondexusa.com\/"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"G. Medvinsky, C. Neuman NetCash: A design for practical electronic currency on the internet. In Proceeding sof the Second ACM Conference on Computer and Communcation Security Novemeber 1994.","DOI":"10.1145\/168588.168601"},{"key":"1_CR20","unstructured":"M. Naor \u201cBit Commitment using Pseudo-Ranomness\u201d Proc. CRYPTO 89."},{"key":"1_CR21","unstructured":"C. Neuman, G. Medvinsky Requirements for network payment: The Netcheque prospective. In Proc. of IEEE COMCON, March 95. available online FTP ftp:\/\/prospero.isi\/edu\/pub\/papers\/security\/"},{"key":"1_CR22","unstructured":"C. Jutla and M. Yung \u201cPaytree: amortized signature for flexible micropayments\u201d In Second USENIX workshop on Electronic Commerce, November 1996."},{"key":"1_CR23","volume-title":"Technical Report DAIMI PB-495","author":"T. Pedersen","year":"1995","unstructured":"T. Pedersen \u201cElectronic payments of small amounts\u201d Technical Report DAIMI PB-495, Aarhus University, Computer Science Department, \u00e5rhus, Denmark, August 1995."},{"key":"1_CR24","volume-title":"\u201cLottery tickets as Micro-Cash\u201d rump session talk at Financial Cryptography'97","author":"R. Rivest","year":"1997","unstructured":"scR. Rivest \u201cLottery tickets as Micro-Cash\u201d rump session talk at Financial Cryptography'97, February 1997, Anguilla, BWI."},{"key":"1_CR25","unstructured":"R. Rivest \u201cElectronic Lottery tickets as Micropayments\u201d Proceedings of Financial Cryptography'97, LNCS series 1318, pp. 306\u2013314."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"R. Rivest \u201cThe MD5 message-digest algorithm\u201d Internet Request for Comments, April 1992. RFC 1321. available online URL http:\/\/theory.lcs.mit.edu\/rivest\/publications.html","DOI":"10.17487\/rfc1321"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"R. Rivest and A. Shamir \u201cPayword and micromint: Two simple micropayment schemes\u201d In fourth Cambridge workshop on security protocols. Springer Verlag, lecture Notes in Computer Science, April 1996. available online URL http:\/\/theory.lcs.mit.edu\/rivest\/publications.html","DOI":"10.1007\/3-540-62494-5_6"},{"key":"1_CR28","unstructured":"V. Shoup \u201cOn Fast and Provaaably Secure Message Authentication Based On Universal Hashing\u201d CRYPTO-96."},{"key":"1_CR29","volume-title":"Conference proceedings of Financial Cryptography '97","author":"J. Stern","year":"1997","unstructured":"J. Stern, S. Vaudenay \u201cSmall-Value-Payment: a Flexible Micropayment Scheme\u201d Conference proceedings of Financial Cryptography '97, February 1997, Anguilla, BWI."},{"key":"1_CR30","unstructured":"Visa and MasterCard \u201cSecure Electronic Transactions (SET) specification, available online URL http:\/\/www.mastercard.com\/set"},{"key":"1_CR31","first-page":"89","volume":"1189","author":"D. Wheeler","year":"1996","unstructured":"D. Wheeler \u201cTransactions using bets\u201d in security protocols Int. Workshop, cambridge, UK April 1996. In LNCS 1189 pp. 89\u201392 available online URL http:\/\/www.cl.cam.ac.uk\/users\/cm213\/Project\/project_publ.html","journal-title":"LNCS"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Y. Yacobi \u201cOn the continuum between on-line and off-line e-cash systems \u2014 I\u201d Conference proceedings of Financial Cryptography'97, February 1997, Anguilla","DOI":"10.1007\/3-540-63594-7_78"},{"key":"1_CR33","unstructured":"A.C. Yao \u201cTheory and Applications of Trapdoor Functions\u201d FOCS 82."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T15:55:58Z","timestamp":1707148558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055469"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/bfb0055469","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}