{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:23Z","timestamp":1725467543279},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055471","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"28-42","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Distributed Trustees and revocability: A framework for internet payment"],"prefix":"10.1007","author":[{"given":"David","family":"M'Ra\u00cfhi","sequence":"first","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"S. A. Brands. Untraceable Off-line Cash in Wallets with Observers. In Crypto '93, LNCS 773, pages 302\u2013318. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"3_CR2","unstructured":"E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based Tracing Extensions to Anonymous Cash and Making of Anonymous Change. In SODA '95, pages 457\u2013466, 1995."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer, and M. Stadler. Digital Payment Systems with Passive Anonymity-Revoking Trustees. In ESORICS '96, LNCS 1146. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61770-1_26"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.-M. Piveteau, and M. Stadler. Fair Blind Signatures. In Eurocrypt '95, LNCS 921, pages 209\u2013219. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-49264-X_17"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.-M. Piveteau, and M. Stadler. An Efficient Fair Payment System. In Proc. of the 3rd CCCS, pages 88\u201394. ACM press, 1996.","DOI":"10.1145\/238168.238193"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84\u201388, February 1981.","journal-title":"Communications of the ACM"},{"key":"3_CR7","first-page":"199","volume-title":"Crypto '82","author":"D. Chaum","year":"1983","unstructured":"D. Chaum. Blind Signatures for Untraceable Payments. In Crypto '82, pages 199\u2013203. Plenum, NY, 1983."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Crypto '88, LNCS 403, pages 319\u2013327. Springer-Verlag, 1989.","DOI":"10.1007\/0-387-34799-2_25"},{"issue":"no.6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. In IEEE Transactions on Information Theory, volume IT-22, no. 6, pages 644\u2013654, november 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"N. Ferguson. Extensions of Single Term Coins. In Crypto '93, LNCS 773, pages 292\u2013301. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_25"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung. \u201cIndirect Disclosure Proof\u201d: Achieving Efficient Fair Off-Line E-Cash. In Asiacrypt '96, LNCS 1163, pages 286\u2013300. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034855"},{"issue":"4","key":"3_CR12","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469\u2013472, july 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung. Revokable and Versatile Electronic Money. In Proc. of the 3rd CCCS, pages 76\u201387. ACM press, 1996.","DOI":"10.1145\/238168.238191"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung. Distributed \u201cMagic Ink\u201d Signatures. In Eurocrypt '97, LNCS 1233, pages 450\u2013464. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_31"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung. Applying Anti-Trust Policies to Increase Trust in a Versatile e-money System. In Financial Cryptography '97, LNCS 1318. Springer-Verlag, 1998.","DOI":"10.1007\/3-540-63594-7_80"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"U. M. Maurer. Diffie Hellman Oracles. In Crypto '96, LNCS 1109, pages 268\u2013282. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_21"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"D. M'Ra\u00cfhi. Cost-Effective Payment Schemes with Privacy Regulation. In Asiacrypt '96, LNCS 1163, pages 266\u2013275. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034853"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Crypto '92, LNCS 740, pages 31\u201353. Springer-Verlag, 1992.","DOI":"10.1007\/3-540-48071-4_3"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"H. Petersen and G. Poupard. Efficient Scalable Fair Cash with Off-line Extortion Prevention. In Proc. of ICICS'97, LNCS 1334, pages 463\u2013477. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0028503"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern. Security Proofs for Signature Schemes. In Eurocrypt '96, LNCS 1070, pages 387\u2013398. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68339-9_33"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern. Provably Secure Blind Signature Schemes. In Asiacrypt '96, LNCS 1163, pages 252\u2013265. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034852"},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21 (2): 120\u2013126, february 1978.","journal-title":"Communications of the ACM"},{"key":"3_CR23","unstructured":"C. P. Schnorr. Efficient Identification and Signatures for Smart Cards. In Crypto '89, LNCS 435, pages 235\u2013251. Springer-Verlag, 1990."},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In Eurocrypt '97, LNCS 1233, pages 256\u2013266. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"S. von Solms and D. Naccache. On Blind Signatures and Perfect Crimes. Computers & Security, 11:581\u2013583, 1992.","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:16:07Z","timestamp":1558271767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/bfb0055471","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}